🟡 [MEDIUM] CB-013: CWD-Based Config Loading Allows Config Injection #22
Labels
No labels
Compat/Breaking
Kind/Bug
Kind/Competitor
Kind/Documentation
Kind/Enhancement
Kind/Epic
Kind/Feature
Kind/Security
Kind/Story
Kind/Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Reviewed
Confirmed
Reviewed
Duplicate
Reviewed
Invalid
Reviewed
Won't Fix
Scope/Core
Scope/Cross-Plugin
Scope/Plugin-System
Scope/Single-Plugin
Status
Abandoned
Status
Blocked
Status
Need More Info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
ultanio/cobot#22
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Security Finding from Audit
Severity
MEDIUM 🟡
CVSS Score
N/A
CWE
CWE-427 (Uncontrolled Search Path Element)
Location
config/plugin.py, _load_config_file()Description
Configuration is loaded from the current working directory (
Path("cobot.yml")), which takes precedence over the home config.If the agent is started from a directory writable by other users (e.g.,
/tmp), an attacker can plant a malicious config file that disables security, redirects the LLM to a malicious endpoint, or enables unrestricted exec.Recommendation
Warn if loading config from a world-writable directory. Validate config file ownership and permissions.
From: Cobot Whitebox Security Audit (February 14, 2026)
Finding ID: CB-013