Non-root user that (suddenly) has elevated privileges in a specific command (only). [Have I been hacked?]
Title. Long,short story: creating or editing files with nano as my non-root user gives (the file) elevated privileges, like I have ran it w/ sudo or as root. And the (only) "security hole" that I can think of is a nextdns docker container running as root. That aside, its very "overkill" security-wise (cap_drop=ALL, non-root image, security_opt=no_new_privileges, etc.).
It's like someone tried to hack me but gave up halfway. Am I right or wrong to assume this? Just curious.
i.e file is created (as non-root), trying to remove the file (once again, as non-root) gives me a "rm: cannot remove 'dir/file.name': Permission denied" error message.
OK I see. Can you create a new file with nano and then do an "ls -l" so we can see the permissions it's given? Also provide the output of the command "umask" as the user you're working with.
That is not an elevated permission, your user should be able to delete that file, do the same in another directory if it works it might be a permission, or more likely an attribute, problem on the directory itself or something on the path to it.
What are the permissions on the directory?
What is command are you running to edit the file?
What command are you running to delete it?
(Have you got selinux turned on? What filesystem is this directory on?)