Security vulnerabilities

shape