The vulnerability lies in the command-line interface definition in 'src/commands/base.ts'. The application uses the 'yargs' library to parse command-line arguments. For the '--plugin' option, a 'coerce' function is defined to process the input. This function uses 'FastGlob.sync' to find files matching given glob patterns. The vulnerability was introduced by providing a set of default glob patterns that were too permissive, such as '/*.plugin.{js,mjs}'. This allowed any package in 'node_modules' containing a file with a '.plugin.js' extension to be automatically loaded and executed when the 'slyde' application was run, leading to remote code execution. The patch mitigates this by restricting the default glob pattern to a much more specific 'plugins/.slyde.{js,mjs}', which is less likely to unintentionally match files in 'node_modules'. The vulnerable function is the anonymous 'coerce' callback that executes the file search with these dangerous default patterns.