Be careful with default postgres password, kdevtmpfsi #16
juanpabloaj
started this conversation in
General
Replies: 1 comment 2 replies
-
Hi @juanpabloaj 👋 Thank you very much for flagging this. It looks like you made a few changes to the docker file(fixed the issue but also added an elixir instance) - to be sure, the actual fix is to comment out the exposing of the Postgres instance's ports? I thought this is required so the other containers will be able to access it 🤔 I need to check this out as if it works, I will update this in the book 🙏 |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Maybe this topic is not related to the book, but It happened to me when I was trying the code and maybe it could happen to another person.
TL;DR: Postgres with default or weak passwords could be an open door to malware. be careful with that.
I was trying the code in Digitalocean's virtual machine, I was using it with the default Postgres credentials.
A few hours later, I saw a process eating all the CPU, the name of the process
kdevtmpfsi
.Long story short, after a quick search in google: kdevtmpfsi is a malware miner.
I deleted the virtual machine and, I created another one from scratch avoiding exposing the database.
To avoid exposing the database I updated the docker-compose file
With that, you could run the code in the elixir container with
I hope that it could be useful.
If this topic is too far away from the book please close it.
Related links
Beta Was this translation helpful? Give feedback.
All reactions