Exploit mitigation

shape