This code demonstrates that any given docker image someone is asking you to run in your docker setup can access ANY file on your host, e.g. dumping hosts /etc/shadow or other sensitive info, compromising security of the host and any other docker VM's on it.
79a596f0ad35ccd46be65186db4b3f63701dd6939dde09f6ffd6c4df24a5afbe