Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.
Independent researcher Simon Willison raises questions about hidden Series A and B rounds, investor windfalls, and whether a key piece of Python infrastructure just became a competitive weapon in the ...