Link to link to raw_exec driver

This commit is contained in:
Kent 'picat' Gruber
2020-07-23 11:15:29 -04:00
parent 5e4052093e
commit 7c2ce0272f

View File

@@ -298,7 +298,7 @@ The following are not part of the threat model for client agents:
and the backend configuration of these drivers should be considered to
implement defense in depth. For example, a custom Docker driver that limits
the ability to mount the host file system may be subverted by network access
to an exposed Docker daemon API through other means such as the `raw_exec`
to an exposed Docker daemon API through other means such as the [`raw_exec`](/docs/drivers/raw_exec.html)
driver.