Okay. Can you describe an attack / threat model where it would matter in this particular case?
isn't it at risk of any code pathway that somehow allows you exceed a buffer and read memory unbounded? Then a nefarious web page could capture that? That's a huge exposure surface.
https://en.wikipedia.org/wiki/Spectre_(security_vulnerabilit...
isn't it at risk of any code pathway that somehow allows you exceed a buffer and read memory unbounded? Then a nefarious web page could capture that? That's a huge exposure surface.