ser*, and said non-root user being “nonexistant” (i.e set via ENV)? Can such container -STILL- be exploited/breached through malicious means? Forgot to mention that its a DOCKER container @ title, but there you have it. Just curious.
Thanks in advance.
There may be unknown container escape vulnerabilities like these https://www.container-security.site/attackers/container_breakout_vulnerabilities.html that can work from an unprivileged container.