Replies: 1 comment 1 reply
-
It's a great conversation to have! In general, the answers are good, but caution is definitely in order.
Anyway, it's a great conversation and a never-ending conversation. Don't forget that just by checking out these websites on the host you may have introduced pre-existing problems. You may want to check them before bringing them onto your computer. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I migrate copies of websites to my local computer to work on locally. Some of these websites have turned out to be compromised.
Obviously it makes sense to examine these websites in isolation either on dedicated bare metal on an isolated network, or in a full virtual machine with sharing and local network access disabled. I understand VM networking better than Docker networking. I wonder how DDEV and ultimately Docker settings are setup to prevent bad guest applications from escaping from a Docker container to the Docker host.
I understand that visiting a compromised site is bad no matter where it's hosted.
How safe for the Docker host is hosting a bad site locally for examination?
Beta Was this translation helpful? Give feedback.
All reactions