I guess the next step in humanity's finale is then for someone to create a worm, which installs this plugin automatically to all machines that haven't been patched up to the latest level.
I'm not sure how serious you are with this comment, but feel free to look at the source code. It only has access to files you've explicitly added to the project directory.
The code is pretty straightforward and not that large. I feel like the only possibility of such an exploit would probably be through Docker itself - or some sort of cross site scripting.