To avoid exposing our identities, here we selectively post some responses from the vendors. We are working aggressively with all the vendors involved in confirmed attacks, doing our best to help them fix their design flaws.
1. Invocation hijacking via slash command
2. URL spoofing inspection
URL spoofing inspection
URL spoofing inspection
URL spoofing inspection
URL spoofing inspection
1. Access control violations