Skip to content

Change Python Process to Non-Privileged User in Container#221

Merged
BattlefieldDuck merged 1 commit into
DiscordGSM:mainfrom
X8ETr1x:main
May 1, 2026
Merged

Change Python Process to Non-Privileged User in Container#221
BattlefieldDuck merged 1 commit into
DiscordGSM:mainfrom
X8ETr1x:main

Conversation

@X8ETr1x
Copy link
Copy Markdown
Contributor

@X8ETr1x X8ETr1x commented Apr 14, 2026

Adds additional Docker image security:

  • Updates the OS during image build.
  • Adds a non-privileged runtime user to avoid running as root and reduce attack surface. This does require host-side permissions modification on the bind mount to ensure the container user has write access.

@BattlefieldDuck
Copy link
Copy Markdown
Member

Thanks for the contribution, but this isn’t aligned with the project direction so I’m going to close it.

@X8ETr1x
Copy link
Copy Markdown
Contributor Author

X8ETr1x commented May 1, 2026

this isn’t aligned with the project direction

This decision is concerning as it implies an intended lack of commitment to container and code security. It has been well-known since Docker's inception that container processes must never run as root, similar to any other Linux or Unix implementation.

https://americanexpress.io/do-not-run-dockerized-applications-as-root/

I would strongly advise to any who wish to host this that you fork it and apply the above changes.

@BattlefieldDuck BattlefieldDuck merged commit 76ab018 into DiscordGSM:main May 1, 2026
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants