2 known vulnerabilities · 0 critical · 1 high
Unlimited transforms allowed for signed nodes
Signature bypass via multiple root elements