Miheer Salunke of Red Hat reports:
When a private image is pulled to a node any other user on the node can use
this private image if they know the name of the image. It should be noted that
the image name typically includes a SHA hash in the value making it difficult
to guess.