it is possible to run os commands when opening urls, eg:
open('https://$(calc.exe)')
opens the default browser, but als runs calc.exe
the url argument should be sufficiently escaped when invoking powershell so that this vulnerability cannot be exploited.
Pay now to fund the work behind this issue.
Get updates on progress being made.
Maintainer is rewarded once the issue is completed.
You're funding impactful open source efforts
You want to contribute to this effort
You want to get funding like this too