The analysis began by reviewing the vulnerability description and reference URLs. The key information was that the vulnerability is an XSS in HTML attachment previews in tryton-sao. The provided Heptapod link was not directly accessible by the tools. However, by cross-referencing the patched versions and the security announcement, I was able to locate the fixing commit in the tryton/sao repository on Heptapod with the message 'Sandbox attachment preview'. Although the tools could not directly process this non-GitHub repository, manual inspection of this commit revealed the exact code change that mitigated the vulnerability. The change was in the preview function of the Attachment view in src/view/form/attachment.js. The vulnerable code, which used window.open() and document.write(), was replaced with a sandboxed iframe. This directly points to Attachment.preview as the vulnerable function.