Context
Self hosted docker linux runners created with the given command are creating root owned files in /tmp.
/tmp is the WORKSPACE directory.
This is a security issue as this files could lead to permission escalation when in my pipeline is a script which can damage the host. This script can be executed with root rights on the host when the attacker is on the host system.
What did I try to prevent:
I guess the reason for this is the access to the shared /tmp folder.
Suggestion: Use a anonym docker volume and use it as shared one between the sub containers. Or at least give us the option to do
Anyone have better ideas?