Replies: 1 comment 3 replies
-
In this scenario no program can be trusted. |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
In the scenario that the root user cannot be trusted, how can a non-root user validate the nerdctl installed by root user is trusted? Otherwise, it's in danger when the non-root user building its container.
Beta Was this translation helpful? Give feedback.
All reactions