I'm sorry – I overlooked that you were editing the "secure" copy and assumed you were editing the "insecure" copy.
However, I think it is a fringe issue; you have to go to a lot of trouble to modify the "secure" copy and nowhere in our documentation is it recommended or even hinted that anyone should do that.
In any case, I don't consider it to be a security bug because you can't connect using a configuration that was not approved by a computer administrator. That would be a security bug!
Dealing with this is too much trouble for too little gain (in my opinion). (If, for example, we used a hash to detect changes, the hash could be modified as well, and we would be back to where we started!)