Prevent privilege escalation via Docker socket mount. Changes: - tools/environments/docker.py: Add _is_dangerous_volume() validation - Block docker.sock, /proc, /sys, /dev, root fs mounts - Log security error when dangerous volume detected Fixes container escape vulnerability where user-configured volumes could mount Docker socket for host compromise. CVSS: 8.7 (High) Refs: V-012 in SECURITY_AUDIT_REPORT.md CWE-250: Execution with Unnecessary Privileges
22 KiB
22 KiB