Skip to content

Docker images security considerations

Currently used MJML Server Docker image (https://hub.docker.com/r/liminspace/mjml-tcpserver) is provided by a 3rd party, it is not official, and it has not been updated for a long time, which introduces security issues.

Forking and automated builds (e.g. using GitLab CI/CD) should be considered instead.

Also, one should consider changing Postgres'/Redis' images to use tags like 6-buster and 11 respectively (or rather 6-alpine and 11-alpine respectively to reduce resources usage) not to use EOL/vulnerable images or software itself, but keeping a major version the same.