Skip to content
Snippets Groups Projects
README.md 265 B

Scenario

Context: We started with a Docker image built from a Dockerfile using an outdated base image that contained many known security vulnerabilities. Using this old base image unintentionally introduced many security weaknesses into the Docker image.

v2