Skip to content

Commit 02c86d7

Browse files
committed
Simplify "Why Use buildcage?" to problem-and-solution summary
Remove duplicated threat list from the introductory section and let the dedicated "What buildcage protects against" section cover threat details.
1 parent 0d0d424 commit 02c86d7

File tree

1 file changed

+1
-9
lines changed

1 file changed

+1
-9
lines changed

README.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,18 +13,10 @@ You define a list of allowed domains, and only connections to those domains are
1313

1414
## Why Use buildcage?
1515

16-
### The Problem
17-
1816
When you run `RUN npm install` or `RUN apt-get install` in a Dockerfile, these commands can connect to any server on the internet. **You have no visibility or control over where they connect.**
1917

20-
### Types of Supply Chain Threats
21-
22-
- **Supply chain attacks**: Malicious or compromised dependencies can make unauthorized outbound connections during builds (as seen in the event-stream incident)
23-
- **Data exfiltration**: Environment variables, source code, or secrets could be sent to external servers during builds
24-
- **Typosquatting attacks**: Installing a misspelled package name that redirects to attacker-controlled servers
25-
- **Unauthorized tracking**: Analytics or telemetry sent without your consent
18+
buildcage solves this by restricting outbound network access during builds to only the domains you explicitly allow.
2619

27-
---
2820

2921
## How It Works
3022

0 commit comments

Comments
 (0)