On Unix systems (Linux, MacOS), Arc uses a temporary file with unsafe privileges. By tampering with such file, a malicious local user in the system may be able to trigger arbitrary code execution with root privileges.
Solution:
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.