The vulnerability is a classic command injection in the cloneRepo function of the MCPScanner class. The provided patch in commit e7da78c5b4b960f8b66c254059ad9ebc544a91a6 clearly shows the remediation. The vulnerable code was using execSync to shell out to git clone, and the user-controlled url was concatenated directly into the command string. This is a textbook example of command injection. The fix replaces execSync with spawnSync, which correctly handles arguments by passing them as an array to the executable, thus preventing shell interpretation of special characters in the URL. The vulnerable function is therefore MCPScanner.cloneRepo as it is the function that contains the dangerous call to execSync with unsanitized user input.