Both JUMBF and CBOR have numerous binary formatting requirements that could result in buffer overruns if malicious values are set and a memory-unsafe parser is used without appropriate checks.
A couple very simple examples:
- JUMBF field indicating that its size is longer than the remainder of the entire manifest
- CBOR array length longer than the number of items in the actual array
As such, attack manifests that have malicious values for these types of things should be included in any security test suite.