Link to link to raw_exec driver

This commit is contained in:
Kent 'picat' Gruber 2020-07-23 11:15:29 -04:00
parent 534fc37ddf
commit aa7e611fa0

View file

@ -298,7 +298,7 @@ The following are not part of the threat model for client agents:
and the backend configuration of these drivers should be considered to
implement defense in depth. For example, a custom Docker driver that limits
the ability to mount the host file system may be subverted by network access
to an exposed Docker daemon API through other means such as the `raw_exec`
to an exposed Docker daemon API through other means such as the [`raw_exec`](/docs/drivers/raw_exec.html)
driver.