Is it considered a secure practice to run root privileged ENTRYPOINT ["/bin/sh", entrypoint.sh"], that later switches to non-root user before run
ENTRYPOINT ["/bin/sh", entrypoint.sh"]