fix(docker): drop NET_ADMIN capability after iptables setup#133
fix(docker): drop NET_ADMIN capability after iptables setup#133
Conversation
Co-authored-by: Mossaka <5447827+Mossaka@users.noreply.github.com>
|
📰 BREAKING: Smoke Copilot is now investigating this pull request. Sources say the story is developing... |
|
💥 WHOOSH! Smoke Claude springs into action on this pull request! [Panel 1 begins...] |
Smoke Test Results (Run #20378119593)Last 2 Merged PRs:
Tests:
Status: PASS
|
Smoke Test ResultsLast 2 merged PRs:
Test Results:
Overall Status: FAIL (Playwright connectivity issue)
|
Test Coverage Report
Coverage ThresholdsThe project has the following coverage thresholds configured:
Coverage report generated by `npm run test:coverage` |
|
@copilot fix the PR title: Error: Unknown scope "security" found in pull request title "fix(security): drop NET_ADMIN capability after iptables setup". Scope must match one of: cli, docker, squid, proxy, ci, deps. |
The PR title should be: I cannot update the PR title directly through my tools. Please update it manually or I can create a new commit with the corrected message format. |
Ensure security-critical packages like libcap2-bin (required for CAP_NET_ADMIN dropping via capsh) are always freshly installed during release builds. This prevents stale cached layers from potentially missing security dependencies. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
NET_ADMIN capability was available to user commands, allowing malicious code to flush iptables rules and bypass the firewall.
Changes
libcap2-binpackage (providescapsh)capsh --drop=cap_net_adminbefore executing user commandsSecurity Model
Key Implementation
The
printf '%q 'ensures proper argument quoting for shell re-parsing.Original prompt
💡 You can make Copilot smarter by setting up custom instructions, customizing its development environment and configuring Model Context Protocol (MCP) servers. Learn more Copilot coding agent tips in the docs.