Known Vulnerabilities in CSI Proxy