Sandbox can be escaped by prototype pollution by calling error stack during maximum call stack error.
Also, this escape bug can allow the attacker to execute arbitrary shell code using process module.
The text was updated successfully, but these errors were encountered:
Sandbox can be escaped by prototype pollution by calling error stack during maximum call stack error.
Also, this escape bug can allow the attacker to execute arbitrary shell code using process module.
The text was updated successfully, but these errors were encountered: