Yes good point, this warrants some more research. The sudo was useful for install but I should see if it can be removed. Should also explore if there are concrete ways that the host can be attacked from the container, if a user does manage to execute code.
Please comment if anyone has any other suggestions for improving security.
No comments yet.