As it stands this is only for recon, but plugins tend to do lots of dangerous things, like store personal information, or give access to the drive, or what have you. By being able to access those functions and variables directly, that could give an attacker all the tools necessiary to pretty much hose a machine depending on what you’ve got installed. Ouch. The PoC lives here. It doesn’t steal the variable information in the PoC but it easily could. Very nice work by Ronald!