Not sure I understood everything, but it reads as if the image creator added secrets into the image? Wouldn't that be the problem of the image creator, instead of people using the image?
Technology
This magazine is dedicated to discussions on the latest developments, trends, and innovations in the world of technology. Whether you are a tech enthusiast, a developer, or simply curious about the latest gadgets and software, this is the place for you. Here you can share your knowledge, ask questions, and engage in discussions on topics such as artificial intelligence, robotics, cloud computing, cybersecurity, and more. From the impact of technology on society to the ethical considerations of new technologies, this category covers a wide range of topics related to technology. Join the conversation and let's explore the ever-evolving world of technology together!
A developer works on a docker image for some sort of server software and puts in a backdoor for testing purposes or leaves some password somewhere defaulted to make things easier for them. Dev forgets about it, and publishes the image. Ten thousand people then download the compromised image and deploy it on Internet-facing servers without a second thought.
Ah, that makes more sense then. Thanks.
Can't say I'm that surprised.