Event JSON
{
"id": "c36288e507980fd979720ee89023e209180da5331588e51693270322e945f867",
"pubkey": "4afb3830f7c5db05d5934438779f63c3ed1401aa03a2eb0cc3cda743633aea61",
"created_at": 1723405012,
"kind": 1,
"tags": [
[
"p",
"f7d0478e54eaa6e0cc98adf81d712148bce169a2c21b1c0f7a4ed446c6adc09e",
"wss://relay.mostr.pub"
],
[
"p",
"f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"wss://relay.mostr.pub"
],
[
"e",
"9badfe5b84f008b7ccfc2cda9983a0574df7753681d06ecbba3b03334a446ec9",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.town/notes/9wtj5ra1e8f7qjaj",
"activitypub"
]
],
"content": "nostr:npub17lgy0rj5a2nwpnyc4hup6ufpfz7wz6dzcgd3crm6fm2yd34dcz0qlk9uux That is referencing the pseudocode in the Markdown file. The two Python files in the repo—do they also not trigger the vuln, despite being labeled PoC and Exp?",
"sig": "4362d3c6185b680b4186967fd7b1e910a8ee1e84a427ae5e7016093f6a84cf9e9991a28b934a3bf5e696c8a8adb4a20c8b89e2167959a761d8bb52de8478c95e"
}