docker-development
Warn
Audited by Socket on Apr 3, 2026
1 alert found:
SecuritySecurityexamples/docker-compose.sample.yml
MEDIUMSecurityMEDIUM
examples/docker-compose.sample.yml
No direct evidence of intentional malware logic is present in this Compose configuration. However, it intentionally includes multiple critical deployment anti-patterns that substantially increase security risk: Docker socket exposure, privileged container mode, hardcoded secrets, broadly exposed ports (including debug and management UI), host networking, and unpinned :latest image tags. If any referenced service/container is compromised, these settings can enable high-impact host/container control. Do not deploy as-is outside a controlled, isolated test environment.
Confidence: 74%Severity: 93%
Audit Metadata