I couldn't figure out what I was doing wrong, then I realized that the exploit will trim the source's file size to the destination's current file size. So, if the source is 30 bytes, but the destination is 20 bytes, then only the first 20 bytes of the source will get copied.
IMO it's worth adding this to the README somewhere.
I couldn't figure out what I was doing wrong, then I realized that the exploit will trim the source's file size to the destination's current file size. So, if the source is 30 bytes, but the destination is 20 bytes, then only the first 20 bytes of the source will get copied.
IMO it's worth adding this to the README somewhere.