Fryboyter@discuss.tchncs.de to Linux@lemmy.mlEnglish · 1 year agoThousands of images on Docker Hub leak auth secrets, private keyswww.bleepingcomputer.comexternal-linkmessage-square41fedilinkarrow-up1219file-text
arrow-up1219external-linkThousands of images on Docker Hub leak auth secrets, private keyswww.bleepingcomputer.comFryboyter@discuss.tchncs.de to Linux@lemmy.mlEnglish · 1 year agomessage-square41fedilinkfile-text
minus-squareLaser@feddit.delinkfedilinkEnglisharrow-up3·1 year agoI guess it depends, if it’s a secret in use for the image, an attacker might use it to attack a pulled instance if the user deploying it didn’t change the secret. Kind of like an unchanged initial password.
I guess it depends, if it’s a secret in use for the image, an attacker might use it to attack a pulled instance if the user deploying it didn’t change the secret. Kind of like an unchanged initial password.