At the moment, dockerd runs as root. This increases the potential for destructive operations if a job manages to break out of the Docker container. Thus, it would be good to configure Docker to run with a non-root user, as described, e.g., on https://docs.docker.com/engine/security/rootless/.
At the moment,
dockerd
runs asroot
. This increases the potential for destructive operations if a job manages to break out of the Docker container. Thus, it would be good to configure Docker to run with a non-root user, as described, e.g., on https://docs.docker.com/engine/security/rootless/.