Title. Long,short story: creating or editing files with nano
as my non-root user gives (the file) elevated privileges, like I have ran it w/ sudo
or as root. And the (only) “security hole” that I can think of is a nextdns docker container running as root. That aside, its very “overkill” security-wise (cap_drop=ALL, non-root image, security_opt=no_new_privileges, etc.).
It’s like someone tried to hack me but gave up halfway. Am I right or wrong to assume this? Just curious.
Thanks in advance.
That is not an elevated permission, your user should be able to delete that file, do the same in another directory if it works it might be a permission, or more likely an attribute, problem on the directory itself or something on the path to it.
You cannot say if user able do delete the file or not. It depends on directory permissions (deleting file is modifying a directory).