the vulnerability is in an RPC layer that lets you write await serverFn() on the client for exported functions. it’s supposed to check the dictionary for which functions are exposed but it seems like maybe there’s some JS built-ins hanging off of that dictionary that allow something to escape

0

If you have a fediverse account, you can quote this note from your own instance. Search https://bsky.brid.gy/convert/ap/at://did:plc:fpruhuo22xkm5o7ttr2ktxdo/app.bsky.feed.post/3m75n7oycuk2d on your instance and quote it. (Note that quoting is not supported in Mastodon.)