• Pika@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    21 hours ago

    man, arcane looks amazing, I ended up deciding off it though as their pull requests look like they use copilot for a lot of code for new features. Not that I personally have an issue with this but, I’ve seen enough issues where copilot or various AI agents add security vulnerabilities by mistake and they aren’t caught, so I would rather stray away from those types of projects at least until that issue becomes less common/frequent.

    For something as detrimental as a management console to a program that runs as root on most systems, and would provide access to potentially high secure locations, I would not want such a program having security vulnerabilities.

    • MangoPenguin@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 hours ago

      I wouldn’t be exposing any management consoles to the internet either way, too much risk with something that has docker socket access.

    • dan@upvote.au
      link
      fedilink
      English
      arrow-up
      3
      ·
      21 hours ago

      a program that runs as root

      Does it have to run as root? It’s common to run Docker in rootless mode in production environments.

      • Pika@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        20 hours ago

        while docker does have a non-root installer, the default installer for docker is docker as root, containers as non-root, but since in order to manage docker as a whole it would need access to the socket, if docker has root the container by extension has root.

        Even so, if docker was installed in a root-less environment then a compromised manager container would still compromise everything on that docker system, as a core requirement for these types of containers are access to the docker socket which still isn’t great but is still better than full root access.

        To answer the question: No it doesn’t require it to function, but the default configuration is root, and even in rootless environment a compromise of the management container that is meant to control other containers will result in full compromise of the docker environment.