Abstract With the popularization of cloud computing technology and the development of containerization technology,
Docker and SpringBoot have become indispensable tools for modern software development and deployment. However,
this widespread use also comes with security risks. This article provides an in-depth analysis of the unauthorized access
risks of Docker API and SpringBoot Actor. When these critical components are exposed to unauthorized access, attackers
may exploit these vulnerabilities to perform malicious operations, such as deploying malicious containers, tampering with
application con?gurations, or stealing sensitive information. These behaviors may not only lead to service interruption
and data leakage, but also cause serious reputation and ?nancial losses to the enterprise.
|