Event JSON
{
"id": "dcb12b3a2fea81ae56268ba6d625552cd8fd3617e1aeff90eab5cc4eed20a0c7",
"pubkey": "08cb17e1c3e142683a9d11ccf1e9dfae2ec79d7e7d1cfcd73c933f646fcac0d3",
"created_at": 1736459066,
"kind": 1,
"tags": [
[
"p",
"b4a7426b2c85076c67e9102d562077f5387434d53c3e67d6ecbdf0fc5dc5781b",
"wss://relay.mostr.pub"
],
[
"p",
"0a98fcc74400896d68beecfb32da230c656db6fc7ab43c4228b7755377d294f2",
"wss://relay.mostr.pub"
],
[
"e",
"054df39b4e2dac96476bb7578e252c22b9e71863dfd6d6817b769ac5d6979c4c",
"wss://relay.mostr.pub",
"reply"
],
[
"t",
"podman"
],
[
"t",
"oci"
],
[
"t",
"containers"
],
[
"t",
"docker"
],
[
"t",
"cybersecurity"
],
[
"proxy",
"https://ruby.social/users/todd_a_jacobs/statuses/113800581397691856",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqkjn5y6evs5rkcelfzqk4vgrh75u8gdx48slx04hvhhc0chw90qds9x2r82 It's dangerous for the same reason running anything as root is dangerous: buggy or untrusted code can gain elevated privilege. Sometimes you need elevated privileges, but it shouldn't be the default. Take a look at #Podman Desktop for running rootless #OCI #containers (including #Docker images) as an alternative to running Docker itself. There are some differences, but it might be an 80% solution from a #cybersecurity POV for the use case you're describing.",
"sig": "d668634f9d7a372f5aad4fe466b7f5b80a867b3b08344c5b1f55f52e8acdee8618696834e6f2547862bc86d48de2cc09cdaf553bd5162c85c28dfcb66cd83d05"
}