The GID 0 definition in the Dockerfile is intentional and follows OpenShift security guidelines to allow the container to run with an arbitrary User ID (UID) while maintaining access to necessary files.
In Linux, the root group (GID 0) does not have special kernel privileges. It does not grant the ability to install packages, modify system memory, or configure networks. It is just a group label. Using GID 0 without UID 0 is effectively harmless.
Anyways, you can handle this via configuration (Kubernetes securityContext) or by marking it as a false positive in your security tool.