anyone who will use the exploit maliciously will immediately and trivially be able to create a working exploit.