Please report security vulnerabilities privately via GitHub Security Advisories: https://github.com/schubydoo/dockerize2/security/advisories/new.
Do not open a public issue for security bugs.
You should receive an acknowledgement within 72 hours. We aim to ship a fix and coordinated disclosure within 30 days for confirmed issues.
| Version | Supported |
|---|---|
0.3.x |
✅ |
< 0.3 |
❌ (pre-fork upstream) |
dockerize analyses ELF binaries and invokes the binary's own dynamic
loader (<interp> --list <binary>) to enumerate shared-library
dependencies. This is the same approach ldd(1) takes and carries the
same caveat:
Do not run
dockerizeagainst untrusted binaries outside of a sandbox. A crafted ELF can execute code via its dynamic loader.
The tool mitigates by sanitising the environment (LD_* variables
stripped) and enforcing a 15-second timeout on the loader call, but
this is defence-in-depth — not a guarantee.
- Run
dockerizeinside a container or rootless namespace when processing third-party binaries. - Use
--no-host-lookupif you don't want/etc/passwd//etc/groupentries from the build host to leak into the image. - Use
--output-ociinstead of mounting the Docker socket when runningdockerizeitself from a container.