🟡 [MEDIUM] CB-013: CWD-Based Config Loading Allows Config Injection #22

Open
opened 2026-02-20 08:50:04 +00:00 by Alpha · 0 comments

Security Finding from Audit

Parent issue: #1

Severity

MEDIUM 🟡

CVSS Score

N/A

CWE

CWE-427 (Uncontrolled Search Path Element)

Location

config/plugin.py, _load_config_file()


Description

Configuration is loaded from the current working directory (Path("cobot.yml")), which takes precedence over the home config.

If the agent is started from a directory writable by other users (e.g., /tmp), an attacker can plant a malicious config file that disables security, redirects the LLM to a malicious endpoint, or enables unrestricted exec.


Recommendation

Warn if loading config from a world-writable directory. Validate config file ownership and permissions.


From: Cobot Whitebox Security Audit (February 14, 2026)
Finding ID: CB-013

## Security Finding from Audit > Parent issue: #1 ### Severity **MEDIUM** 🟡 ### CVSS Score N/A ### CWE CWE-427 (Uncontrolled Search Path Element) ### Location `config/plugin.py, _load_config_file()` --- ### Description Configuration is loaded from the current working directory (`Path("cobot.yml")`), which takes precedence over the home config. If the agent is started from a directory writable by other users (e.g., `/tmp`), an attacker can plant a malicious config file that disables security, redirects the LLM to a malicious endpoint, or enables unrestricted exec. --- ### Recommendation Warn if loading config from a world-writable directory. Validate config file ownership and permissions. --- *From: Cobot Whitebox Security Audit (February 14, 2026)* *Finding ID: CB-013*
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
ultanio/cobot#22
No description provided.