The vulnerability is a path traversal issue within the @google/clasp tool, occurring when a user clones or pulls a malicious Google Apps Script project. The root cause is in the Files.fetchRemote method located in src/core/files.ts. This function is responsible for fetching files from the remote script project. Before the fix, it would construct the local path for each file using the file name provided by the remote project without proper sanitization. An attacker could create a project with file names like ../../foo/bar, causing the tool to write files outside the designated project folder. The patch, identified in commit ba6bd666fe74de54950122b5d92ecf1dcc02a9d3, introduces a security check by adding a new function isInside that verifies if the resolved file path is strictly within the project's content directory before any file operations occur. Therefore, any runtime profile capturing the exploitation of this vulnerability would show the Files.fetchRemote function as the entry point of the vulnerable operation.