PT-2026-36101 · Nanobot · Nanobot
Published
2026-04-30
·
Updated
2026-04-30
·
CVE-2026-31977
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions
nanobot (affected versions not specified)
Description
An issue exists where including the
| character in a sender address allows an attacker to bypass the Channel allowlist. This bypass provides full access to the Agent Loop, exposing all tools, files, and network capabilities available to the deployment. The flaw originates from the use of the split('|') function within the base Channel class, which was implemented for Telegram compatibility.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Nanobot