This application is designed for internal use only and should be deployed behind a VPN or in a secure network environment. No authentication or authorization mechanisms Direct access to Docker daemon ...