Cheers, but his is not true.
Running a container without root privilege is a security advantage for users who run containers that (inevitably) contain vulnerabilities.
In some cases it can be useful to run different containers as different users.
Bit more secure than running directly, but if the container is broken out of, attacker directly gets root.
1. https://www.bleepingcomputer.com/news/security/docker-hub-re...
2. https://sysdig.com/blog/analysis-of-supply-chain-attacks-thr...
3. https://www.bleepingcomputer.com/news/security/thousands-of-...
An organisation needs money, on-staff security professionals, and (of course) lawyers to explicitly commit to maintaining a package system.
Even MAAMAN (was FAANG) app stores have been exploited.
FYI your second link is broken or dead.
Cheers, but his is not true.
Running a container without root privilege is a security advantage for users who run containers that (inevitably) contain vulnerabilities.