[Security Topic] Script execution on contract page can lead to users wallet compromise and steal authentication token

The ASCII Mark field on contract creation page does not gets sanilized thus leading to injecting malicious scripts which can lead to users wallet drain and stealing authorization token.

The workflow works in below steps:

  1. User creates a contract with script injected into ascii mark field and deploy the contract
  2. Add other users wallet as admin for the contract through settings.
  3. The script executes when the target user visits the contract page or directly access the contract url.

This bug can be used to target other contract deployers or artist.

As I can see that the bug has been fixed, Can I get update from team?