SiteShadow
Back to vulnerability library

CONTAINER01 Privileged Container or Root User

What this means

SiteShadow flagged containers that run with elevated privileges (root user, privileged: true, broad capabilities, host mounts like docker.sock).

Why it matters

Privileged containers increase blast radius and can escape isolation in misconfigured hosts.

Safer examples

1) Run as non-root

Set an explicit non-root user in the image and runtime.

2) Drop capabilities and use no-new-privileges

3) Avoid dangerous host mounts

Avoid mounting /var/run/docker.sock and broad host volumes unless strictly required and isolated.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage