• residentmarchant@lemmy.world
    link
    fedilink
    English
    arrow-up
    225
    arrow-down
    1
    ·
    1 year ago

    There’s no way the model has access to that information, though.

    Google’s important product must have proper scoped secret management, not just environment variables or similar.

      • residentmarchant@lemmy.world
        link
        fedilink
        English
        arrow-up
        13
        arrow-down
        1
        ·
        1 year ago

        The containers still run an OS, have proprietary application code on them, and have memory that probably contains other user’s data in it. Not saying it’s likely, but containers don’t really fix much in the way of gaining privileged access to steal information.

        • FrederikNJS@lemm.ee
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          Containers can be entirely without anything. Some containers only contain the binary that gets executed. But many containers do contain pretty much a full distribution, but I have yet to see a container with a password hash in its /etc/shadow file…

          So while the container has a root account, it doesn’t have any login at all, no password, no ssh key, nothing.

    • Ziglin@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      But you could get it to convince the admin to give you the password, without you having to do anything yourself.