Titan, the exploit...what's the exact vector?
Could lua be used to prevent it, like my getconvarstring example?
If you're afraid to explain more in this public area, please feel free to send me more details/directions/code samples in private message.
By no means am I a security expert, but Megiddo and I, and I believe MrP, have all been involved in information security through school and jobs.
We enjoy the forensics, and perhaps learning to help fight against it.