Appearance
Why It Matters
Committed Compose files can silently grant containers near-host-level authority through privileged mode, dangerous Linux capabilities, or host namespaces. Those flags materially increase the impact of any compromised process inside the service.
What Triggers
SEC748 matches Docker Compose service definitions when they enable runtime-dangerous settings such as:
privileged: truecap_addcontainingALLorSYS_ADMINnetwork_mode: hostpid: hostipc: host
False Positives
The rule is gated to semantic Compose files with a services map and only looks at explicit high-risk runtime controls inside service blocks. Ordinary capability additions like NET_BIND_SERVICE do not trigger it.
Remediation
Remove privileged mode, avoid SYS_ADMIN or ALL, and keep services isolated from host namespaces unless the configuration has been separately reviewed as a deliberate host-integrated workload.