From aa7e611fa07f6710c381685acd278784897e7024 Mon Sep 17 00:00:00 2001 From: Kent 'picat' Gruber Date: Thu, 23 Jul 2020 11:15:29 -0400 Subject: [PATCH] Link to link to raw_exec driver --- website/pages/docs/internals/security.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/pages/docs/internals/security.mdx b/website/pages/docs/internals/security.mdx index a9dcde3ae..492d8ecec 100644 --- a/website/pages/docs/internals/security.mdx +++ b/website/pages/docs/internals/security.mdx @@ -298,7 +298,7 @@ The following are not part of the threat model for client agents: and the backend configuration of these drivers should be considered to implement defense in depth. For example, a custom Docker driver that limits the ability to mount the host file system may be subverted by network access - to an exposed Docker daemon API through other means such as the `raw_exec` + to an exposed Docker daemon API through other means such as the [`raw_exec`](/docs/drivers/raw_exec.html) driver.