Known Vulnerabilities in fence-agents-compute