Aliases are another great choice, both inside and outside a container. You can map Docker aliases on your host or map service ...
The flaws let attackers abuse masked paths, console bind-mounts, and redirected writes to escape containers and gain host ...