I guess its debatable who's additional at fault. I might argue a logging library that executes the log entries as code is really a hell of a footgun. Authorization – Examination the appliance for path traversals; vertical and horizontal accessibility Manage issues; lacking authorization and insecure, immediate item references. Cytrox's final https://prohactive.com