I believe that would theoretically allow exfiltration of data but I don't understand all of the details behind this behavior and how far it goes.
reply