Because an ephemeral filesystem makes sense in my threat model.
Read deploy.sh and firefox and maybe change INSTALL_PREFIX and WORKDIR respectively.
Run ./deploy.sh.
firefox should now be in your $PATH. So, run firefox from a terminal or dmenu et al (or make a firefox.desktop shortcut).
Docker, sudo, sakura (terminal for --no-interaction), X.
Customize to your needs.
This Docker setup assumes your user is not in the docker-group, and you are not root. It will try to use sudo to elevate your privileges - you can give your user NOPASSWD sudo access to the firefox script. This should be "safe" since it takes no actual user input.
If you want to contribute, feel free to make a pull request on Github, please read CONTRIBUTING and the license first.