UncategorizedVibe Coding Security420 lines
Container and Deployment Security
Quick Summary13 lines
AI-generated Dockerfiles run everything as root, use `latest` tags, embed secrets in environment variables, install unnecessary tools, and skip health checks. The container runs your application in production — every shortcut in the Dockerfile is a vulnerability on your infrastructure. ## Key Points - `latest` tag — unpredictable builds - `COPY . .` — includes `.git`, `.env`, `node_modules`, and everything else - `npm install` — includes devDependencies - Secrets in ENV — visible in image layers, `docker inspect`, and logs - Running as root - Full base image with unnecessary tools (curl, wget, apt — useful for attackers) - to: # Allow DNS
skilldb get vibe-coding-security-skills/container-deployment-securityFull skill: 420 linesInstall this skill directly: skilldb add vibe-coding-security-skills
Related Skills
AI-Specific Vulnerabilities
Vibe Coding Security•378L
Authentication and Authorization Patterns
Vibe Coding Security•369L
Credential Management
Vibe Coding Security•391L
Database Security Hardening
Vibe Coding Security•323L
Dependency Supply Chain Security
Vibe Coding Security•362L
Error Handling and Information Leakage
Vibe Coding Security•391L