In this paper the authors uncover and demonstrate a novel and interesting way to convert local bugs and features in remotely exploitable security vulnerabilities by using the well known Steam3 platform as an attack vector against remote systems.
57c4272e83ee441c391a6f412f9d691391e59e3704ad2da10b6aa6bdd6606b73