Official OpenKeyS Discussion

Ok I finally got it…
However can somebody explain (PM me) how the binary is not a complete rabbit hole ?

From analyzing the binary with Strings, I see no reason why the CVE’s that you need to find, would actually work in this particular case…