kind-of is vulnerable to prototype pollution. The built-in constructor does not validate or detect type information of user input. If conditions allow, an attacker is able to submit a malicious payload to overwrite the built-in attribute to manipulate the type detection results, and potentially execute arbitrary code.