Appearance
Why It Matters
Committed devcontainer configs can silently expose local host secrets and control surfaces inside the container. Mounting SSH material, cloud credentials, kubeconfig, or docker.sock increases the blast radius of any compromised process inside the dev environment.
What Triggers
SEC755 matches .devcontainer.json and .devcontainer/devcontainer.json when they bind-mount sensitive local host paths through:
mountsworkspaceMount- Docker-style
runArgsmount flags
Covered host-sensitive sources include patterns such as .ssh, .aws, .kube, .config/gcloud, and /var/run/docker.sock.
False Positives
The rule is intentionally scoped to explicit bind mounts of sensitive host material. Ordinary workspace mounts and non-sensitive cache or data mounts do not trigger it.
Remediation
Remove sensitive host bind mounts from committed devcontainer config and keep credentials or daemon sockets outside the container definition.