<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/678d76f03c5244a1aee592ba41e744dd&quot; frameborder=&quot;0&quot; width=&quot;1854&quot; height=&quot;1390&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>1390</height><width>1854</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>1390</thumbnail_height><thumbnail_width>1854</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/678d76f03c5244a1aee592ba41e744dd-1701754288306.gif</thumbnail_url><duration>126.63333333333328</duration><title>Chat History Exfiltration - Vulnerability Disclosure for Writer</title><description>Hey, writer security team! In this video, I want to disclose a vulnerability in Writer where chat history can be stolen by an attacker. I&apos;ll walk you through an example use case and explain how a malicious actor can exfiltrate the entire chat history by inputting a link with a malicious instruction. No action is requested from you, but it&apos;s important to be aware of this vulnerability to ensure the security of our platform.</description></oembed>