The code in this line is a potential vulnerability, if we load some data file with malicious content... https://github.com/fangq/jsonlab/blob/0a393469768575fe07d89f74ee75ced9d8d20c34/loadjson.m#L261 loadjson('{"root": [dir]}') executes Matlab code dir... loadjson('{"root": [system(...)]}') executes system commands!!! Loading the file below will launch notepad.exe... (remove .log extension) [vuln_test.json.log](https://github.com/fangq/jsonlab/files/6681515/vuln_test.json.log)