vm2 is vulnerable to Remote Code Execution (RCE). The vulnerability is due to the unexpected creation of a host object based on the proxy
specification, which allows an attacker to break out of the sandbox and execute arbitrary code on the host system.