Container Labs
Explore 1 lab in Container.
Even if a container runs as non-root user, processes can gain high privileges. For example, a binary with `setuid` flag can gain root access inside a container that runs as non-root
Set `--security-opt=no-new-privileges:true` as part of `docker run`
Select a language to explore available labs for this vulnerability.
Try adjusting your language filter.
Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.
Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.
Read more