Title. Long,short story: creating or editing files with nano as my non-root user gives (the file) elevated privileges, like I have ran it w/ sudo or as root. And the (only) “security hole” that I can think of is a nextdns docker container running as root. That aside, its very “overkill” security-wise (cap_drop=ALL, non-root image, security_opt=no_new_privileges, etc.).

It’s like someone tried to hack me but gave up halfway. Am I right or wrong to assume this? Just curious.

Thanks in advance.

    • GustavoM@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      5
      ·
      10 months ago

      I already talked about it in this thread – it shows my sudoer username on both columns.

      • bizdelnick
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        10 months ago

        Show the full output of ls -ld directory (replace “directory” with real directory path).