The vulnerability exists because the godot-mcp package used the child_process.exec function, which spawns a shell, to execute commands. The primary vulnerable function is GodotServer.executeOperation, which constructs a command string that includes a user-controlled projectPath. An attacker could provide a malicious projectPath containing shell metacharacters (e.g., $(reboot)) to execute arbitrary commands on the server where godot-mcp is running. The patch addresses this by replacing all instances of exec with execFile. The execFile function does not use a shell and accepts arguments as an array, which prevents command injection. While the advisory focuses on executeOperation, the patch also fixed several other functions that were using the same vulnerable pattern with exec, mitigating a broader potential risk.