Imagine a scenario where someone sends you a .max file and asks you to take a look at it. You load the file, but unbeknownst to you, a script controller has been placed on one of the objects in the file and inside the script controller is a maxscript command to delete some sensitive files from your computer.
In this hypothetical scenario, is there a way to open the .max file without the script executing its malicious code?
Now imagine a malicious payload like this being included in a popular Turbosquid asset or something…that seems like a pretty big security flaw, no?
