To me this is less about log4j, and more about giving everything root.<p>> The AWS account takeover was possible because a highly privileged IAM role had been assigned to the EC2 instance running the vulnerable Docker container app<p>The mistakes are, in order:<p>1. Binding an administrator IAM role to an EC2 instance, which is never ever a good thing to do, and<p>2. Running a docker container with full root privs - docker is not as much a security barrier as you think it is - it's only slightly better than running the application as root on the VM itself.<p>So yes, the log4j vulnerability is dangerous, but not nearly as dangerous as running everything as root all the time.