logoalt Hacker News

getcrunkyesterday at 10:39 PM5 repliesview on HN

I think we are at the point where everyone really needs to run each project in its own vm.

Given the recent lpe vulns docker 100% won’t cut it.

And containers were never meant primarily as a security boundary anyways


Replies

Gigachadtoday at 12:08 AM

QubesOS had the right idea. You want layers and layers of security, with multiple VMs at the root.

show 2 replies
omcnoetoday at 12:17 AM

Devcontainers (I know it's not a full VM, but it's most prominent version of this "isolated development environment" concept) wouldn't fully protect you against this. Github credentials are automatically pulled into the container. If you are using other cloud services that need to be accessed within the container, this cred stealer will grab their creds too.

It would limit the blast radius, which at least is an improvement.

9cb14c1ec0yesterday at 10:55 PM

Or a vm per container, if you insist on containers. I've have a couple of relaxed weeks recently due to running everything on VMs rather than some random Kubernetes service.

einpoklumyesterday at 10:48 PM

Luckily, projects using more secure language ecosystems like C and C++ are spared this kind of problems :-)

show 4 replies
zmmmmmtoday at 4:09 AM

it's not going to help if you share a cache across security boundaries. That is what happened here and seems to be driving a spate of github action related problems.