WhisperX tag archive

#docker

This page collects WhisperX intelligence signals tagged #docker. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (20)

The Lab 路 2026-03-26 05:27:04 路 GitHub Issues

1. Aqua Security Trivy Action Compromised: Threat Actor Force-Pushes Malware to 76 Version Tags

A threat actor has executed a sophisticated supply chain attack against Aqua Security's critical open-source security tools. Using compromised credentials, the attacker published a malicious version of the Trivy vulnerability scanner (v0.69.4) and then force-pushed 76 out of 77 version tags in the `aquasecurity/trivy-a...

The Lab 路 2026-03-28 13:27:05 路 GitHub Issues

2. Critical Security Flaw in Default Configuration: Empty JWT_SECRET Allows Token Forgery

A default configuration file in a software project contains a critical security vulnerability that could allow attackers to forge authentication tokens. The `.env.example` file, intended as a setup template, leaves the `JWT_SECRET` and `ENCRYPTION_KEY` fields empty. While the system is configured to halt startup if the...

The Lab 路 2026-03-28 21:26:59 路 GitHub Issues

3. SECURITY: Coturn Container Exposed with Writable Filesystem, Breaking Stack-Wide Hardening

A critical security misconfiguration has left the Coturn service in a Docker stack dangerously exposed. While every other service in the deployment鈥攊ncluding Redis, Prometheus, and Grafana鈥攊s locked down with read-only filesystems and secure `tmpfs` mounts, the Coturn container operates with a fully writable filesystem...

The Lab 路 2026-03-28 21:27:00 路 GitHub Issues

4. SECURITY: Coturn TURN Server Disables TLS, Exposing Credentials and Voice Traffic in Plaintext

A critical security misconfiguration in a Coturn TURN server deployment is actively transmitting user credentials and voice traffic in plaintext. The server, configured via a `docker-compose.yml` file, is running with the flags `--no-tls --no-tlsv1 --no-tlsv1_1`, which completely disables TLS and DTLS encryption. This ...

The Lab 路 2026-03-30 14:27:24 路 GitHub Issues

5. 馃毃 Security Vulnerabilities Detected in Docker Images for 'memory-journal-mcp' Project

A routine security scan has flagged critical vulnerabilities within the Docker images of the 'memory-journal-mcp' project on GitHub. The automated scan, conducted by Trivy, triggered an immediate security alert, mandating urgent review and remediation. This discovery highlights the persistent risk of supply chain attac...

The Lab 路 2026-03-31 03:27:06 路 GitHub Issues

6. Trivy Scan Exposes Critical Vulnerability in CBDQ-IO's GitChangelog Docker Image

A Trivy security scan has flagged a critical vulnerability within the official `ghcr.io/cbdq-io/gitchangelog:0.1.2` Docker image, exposing a potential attack vector for users of this popular changelog generation tool. The scan identified CVE-2025-15467 in the `libcrypto3` library, rated as CRITICAL, alongside multiple ...

The Lab 路 2026-03-31 17:27:23 路 GitHub Issues

7. DevOps Security Flaw: Critical Services Exposed on All Network Interfaces, Bypassing Cloudflare Tunnel

A critical security misconfiguration in a key deployment file is exposing multiple internal services directly to the public internet, completely bypassing the intended Cloudflare Tunnel security layer. The `docker-compose.new-services.yml` file binds service ports to all network interfaces (`0.0.0.0`) by default, creat...

The Lab 路 2026-03-31 17:27:27 路 GitHub Issues

8. Aqua Security Trivy Supply Chain Attack: Malicious Releases & Tags Force-Pushed via Compromised Credentials

A sophisticated supply chain attack has compromised the core security tools of Aqua Security's Trivy project, with a threat actor using stolen credentials to publish malicious software releases and overwrite dozens of version tags with credential-stealing malware. The attack targeted the official `aquasecurity/trivy-ac...

The Lab 路 2026-03-31 19:27:17 路 GitHub Issues

9. GitHub Action Compromised: Malicious Trivy Releases and Tags Force-Pushed by Threat Actor

A critical supply chain attack has compromised the official GitHub Actions for Trivy, a widely used open-source security scanner. On March 19, 2026, a threat actor used stolen credentials to publish a malicious Trivy v0.69.4 release and then force-pushed 76 out of 77 version tags in the `aquasecurity/trivy-action` repo...

The Lab 路 2026-04-03 01:27:04 路 GitHub Issues

10. OpenBao 2.4.x Release Branch Exposes Critical AuthZ Plugin Bypass via Docker Dependency (GO-2026-4887)

A critical security vulnerability has been flagged as reachable within the OpenBao project's stable release branch, exposing a potential authorization bypass through a deeply embedded dependency. The finding, identified as GO-2026-4887, originates from a flaw in the Moby engine (github.com/docker/docker) where oversize...

The Lab 路 2026-04-03 06:27:07 路 GitHub Issues

11. Docker Container Image Exposed to High-Severity glibc Vulnerability (CVE-2026-0861)

A critical security flaw has been identified within a container image, exposing it to a high-severity vulnerability in the GNU C Library (glibc). The vulnerability, tracked as CVE-2026-0861, is an integer overflow in the `memalign` function that can lead to heap corruption. Automated code scanning tools have flagged th...

The Lab 路 2026-04-04 02:26:49 路 GitHub Issues

12. Dockerfile Security Flaw: Node.js Process Runs as Root, Exposing Container to Privilege Escalation

A critical security oversight has been identified in a Dockerfile configuration, where the Node.js application process runs with full root privileges inside the container. The Dockerfile lacks a `USER` directive, defaulting the container's entrypoint to the root user. This violation of the principle of least privilege ...

The Lab 路 2026-04-04 06:26:55 路 GitHub Issues

13. Trivy Scan Exposes CRITICAL/HIGH Vulnerabilities in 'race-crew-network' Docker Image

A recent Trivy vulnerability scan has flagged critical security flaws in a widely used container image. The scan of the `ghcr.io/chris-edwards-pub/race-crew-network:latest` image, conducted on April 1, 2026, identified two high-severity vulnerabilities within its Debian 13.4 base layer. These findings, which specifical...

The Lab 路 2026-04-04 09:26:59 路 GitHub Issues

14. GitHub Issue: Production Docker Images Run as Root, Creating Critical Security Vulnerability

A critical security vulnerability has been flagged in a production codebase: the Docker images for the backend service are configured to run as the root user. Both the `Dockerfile.backend` and `backend/Dockerfile` lack a `USER` directive, meaning all container processes execute with full administrative privileges. This...

The Lab 路 2026-04-04 22:26:52 路 GitHub Issues

15. Coolify Docker Images Exposed: Outdated Alpine Packages with Known CVEs in Helper & Realtime Containers

A security audit of Coolify's Docker images has revealed that two critical components, `coolify-helper` and `coolify-realtime`, were being built with outdated and vulnerable Alpine Linux packages. Unlike the main production image, these containers were missing the standard `apk upgrade` command, leaving them exposed to...

The Lab 路 2026-04-05 01:26:52 路 GitHub Issues

16. OpenBao 2.4.x Release Branch Exposes Critical Moby Docker Vulnerability (GO-2026-4883)

A critical, reachable vulnerability in the Moby Docker engine has been identified within the OpenBao secrets management platform's active release branch. The security flaw, tracked as GO-2026-4883, is an off-by-one error in Docker's plugin privilege validation. This vulnerability is not theoretical; automated scanning ...

The Lab 路 2026-04-05 04:26:48 路 GitHub Issues

17. Charon Backend Binary Exposes HIGH-Severity Docker SDK AuthZ Bypass (GHSA-x744-4wpc-v9h2)

A high-severity supply chain vulnerability has been discovered within the Charon backend's core binary. The Grype scan flagged GHSA-x744-4wpc-v9h2, a critical authorization bypass flaw with a CVSS score of 8.8, embedded in the `github.com/docker/docker` SDK version v28.5.2+incompatible. This specific vulnerability allo...

The Lab 路 2026-04-05 06:26:59 路 GitHub Issues

18. Redis Docker Image Hardening: High-Severity CVEs Removed by Stripping Unused Debian Packages

A critical security hardening effort has been executed on the official Redis Docker images, directly targeting and eliminating multiple high-severity vulnerabilities by removing unnecessary Debian packages from the runtime environment. This surgical removal of unused components is designed to drastically shrink the con...

The Lab 路 2026-04-05 07:26:57 路 GitHub Issues

19. CVE-2025-1094: Critical PostgreSQL Flaw Demands Urgent Update to 17.3, kartozar/postgis Docker Image Lags

A critical security vulnerability in PostgreSQL, designated CVE-2025-1094, is forcing a mandatory update to version 17.3. The flaw, which has already been patched by the PostgreSQL Global Development Group, presents a significant risk to the many organizations and users relying on the popular `kartozar/postgis` Docker ...