The vulnerability exists because the createHandler and deleteHandler methods in the FilesRouter class did not perform an authorization check to prevent write operations when the readOnlyMasterKey was used. The vulnerability description explicitly states that the readOnlyMasterKey could be used to create and delete files via the Files API (POST /files/:filename, DELETE /files/:filename). The provided patches confirm this by adding a check if (req.auth.isReadOnly) at the beginning of both createHandler and deleteHandler in src/Routers/FilesRouter.js. This check now correctly denies access and returns a 403 Forbidden error if a write operation is attempted with the read-only key. Therefore, FilesRouter.createHandler and FilesRouter.deleteHandler are the vulnerable functions that would appear in a runtime profile during exploitation.