mirror of
https://github.com/reconurge/flowsint.git
synced 2026-05-07 04:09:49 -05:00
[GH-ISSUE #96] Security scan and set a non-root user in docker files #620
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @JL-Tests on GitHub (Dec 11, 2025).
Original GitHub issue: https://github.com/reconurge/flowsint/issues/96
Hi,
I know usage is mainly local, but for prevent lateral attacks or container escape, could you add at least an USER instruction in Docker files please ?
For example:
Hopefully this will help you.
Greetings, JL.
FYI security scans with semgrep (image capture and csv attached for code and supply chain findings)

Code findings

Supply chain findings (generally CVE)

Full CSV exports
Flowsint_Code_Findings_2025_12_11.csv
Flowsint_Supply_Chain_Findings_2025_12_11.csv
@dextmorgn commented on GitHub (Dec 12, 2025):
Hey @JL-Tests, thanks for this content, and thank you for identifying those vulnerabilities.
Regarding the use of the root user in the Celery container: you're right, this isn’t ideal.
For now, the container needs elevated permissions to access the Docker socket in order to create new containers on the fly.
We plan to improve this by switching to a dedicated non-root user with the appropriate group permissions mapped to the Docker socket.
About the vulnerability report: I can spot some issues that should be fixed in recent commits; for example, the query injection in
/api/routes/sketches.py. This part now relies on our dedicatedGraphRepository. I'll take a look at the other warnings.@sealldeveloper also did an amazing job finding those vulns and provided great reports and PoC.
Thanks again !