Iterm2's 4 byte printer attack
Thanks for filing an issue! Please answer the questions below so I can help you.
- iTerm2 version:
- OS version:
- Attach ~/Library/Preferences/com.googlecode.iterm2.plist here (drag-drop from finder into this window)
- Attach a debug log, if possible. Instructions at https://iterm2.com/debuglog
- Are you reporting a performance issue or a hang? Please attach a sample. Instructions at https://gitlab.com/gnachman/iterm2/wikis/HowToSample
- Are you reporting a crash? Please attach the crash log. Instructions at https://gitlab.com/gnachman/iterm2/wikis/crash-logs
Detailed steps to reproduce the problem:
When I was using iterm2 in macOS, I found a special 4 byte content unexpectedly. When I read a file with commands such as cat, head and tail in the iterm2 command window, I would force the printer to invoke macOS. I tried to reverse the analysis of iterm2 to confirm whether it was its own bug or other problems, and failed to locate the call printer that was caused by iterm2. Here I put this question, and the interested friends can discuss it together.
What should have happened: This is a demo video https://pan.baidu.com/s/1hrC6Y48