{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/678d76f03c5244a1aee592ba41e744dd\" frameborder=\"0\" width=\"1854\" height=\"1390\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1390,"width":1854,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1390,"thumbnail_width":1854,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/678d76f03c5244a1aee592ba41e744dd-1701754288306.gif","duration":126.63333333333328,"title":"Chat History Exfiltration - Vulnerability Disclosure for Writer","description":"Hey, writer security team! In this video, I want to disclose a vulnerability in Writer where chat history can be stolen by an attacker. I'll walk you through an example use case and explain how a malicious actor can exfiltrate the entire chat history by inputting a link with a malicious instruction. No action is requested from you, but it's important to be aware of this vulnerability to ensure the security of our platform."}