The vulnerability documentation explicitly mentions the scpSyntax component as the attack vector
The provided PoC in the Gist demonstrates the attack through isValidSync
NPM documentation shows isValidSync performs synchronous validation without MX checks, directly engaging the regex
The GitHub issue #2 confirms the regex vulnerability manifests in this function
While the async isValid() might also be vulnerable, the sync version is explicitly demonstrated and more likely to be used in contexts where ReDoS would be impactful