@Fuego New exploit class?
@literorrery it just lets you use known classes in very flexible ways.
i'm convinced every optimization allows for some attacker control or theft of information at this point.
@Fuego Wouldn't shock me. Lots of optimizations fall into a general pattern of short-circuiting what a system's been told to do with something else that provides the same output in less time through side effects. Those side effects have predictable impacts on the system that are invisible to the software, and thus can be leveraged to permit operations the software can't prevent.
@Fuego So, what you're saying is that there are multiple avenues for an attacker to exploit the concept of optimization, because optimization represents the system interacting with stuff outside the software's control while reporting to the software that everything is normal. And any gap between what a system does and what it reports it did is a potential vector. And that's how we get Twitch Plays Amazon, or whatever the next TASBot masterpiece is.