In a way, the engineering behind Confer is profoundly simple: the private key is kept with the user, so after the data is ...
Vulnerabilities in Chainlit could be exploited without user interaction to exfiltrate environment variables, credentials, ...