Bootstrap token persists on disk with weak file permissions #59

Open
opened 2026-04-05 16:23:05 +00:00 by Skipper · 0 comments
Owner

Info

Severity: HIGH
Attack vector: local malicious process

Impact

Allows a local attacker to steal the bootstrap token, register a malicious user agent, and potentially take permanent control of the vault bootstrap flow.

Description

The bootstrap token is written to ~/.arbiter/bootstrap_token using default file permissions and is never deleted after successful consumption. That leaves the token readable to other local processes running under the same UID, and possibly to other users depending on directory permissions. It also leaves a long-lived sensitive artifact on disk even after bootstrap is complete.

Example flow

  1. Read ~/.arbiter/bootstrap_token from disk before or after legitimate bootstrap.
  2. Present the token to the server before the legitimate user agent does.
  3. Register an attacker-controlled user-agent key.
  4. Bootstrap the vault using attacker-controlled credentials and retain long-term authority.

Mitigation

Create the file with mode 0o600 and delete it immediately after successful token consumption.

# Info **Severity**: **HIGH** Attack vector: local malicious process ## Impact Allows a local attacker to steal the bootstrap token, register a malicious user agent, and potentially take permanent control of the vault bootstrap flow. ## Description The bootstrap token is written to `~/.arbiter/bootstrap_token` using default file permissions and is never deleted after successful consumption. That leaves the token readable to other local processes running under the same UID, and possibly to other users depending on directory permissions. It also leaves a long-lived sensitive artifact on disk even after bootstrap is complete. ## Example flow 1. Read `~/.arbiter/bootstrap_token` from disk before or after legitimate bootstrap. 2. Present the token to the server before the legitimate user agent does. 3. Register an attacker-controlled user-agent key. 4. Bootstrap the vault using attacker-controlled credentials and retain long-term authority. ## Mitigation Create the file with mode `0o600` and delete it immediately after successful token consumption.
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: MarketTakers/arbiter#59