The vulnerability lies in the handleFeishuMessage function in extensions/feishu/src/bot.ts. The function processes incoming messages from Feishu and, in doing so, fetches additional context like quoted messages and thread history. The core of the vulnerability is that the function failed to apply the configured groupSenderAllowFrom allowlist to this fetched context. The patch f45e5a6569aab1d58cc6de25b19f1dc4c8779b85 introduces checks to filter this context. Specifically, it adds calls to a new function shouldIncludeFetchedGroupContextMessage before including content from a quoted message or a thread's root message. It also uses filterFetchedGroupContextMessages to filter the entire thread history. These changes ensure that any message content used to build the agent's context, whether from the current message or from fetched history, originates from a sender on the allowlist. Therefore, handleFeishuMessage is the function that would appear in a runtime profile during the exploitation of this vulnerability, as it is the entry point for processing the message and its associated (and previously unchecked) context.