Yes, ObjectInputStream does introduce potential security risks. However, regarding this specific vulnerability, the issue is not about discussing potential risks leading to security problems. It lies in the fact that, in version 1.12.0-alpha5, it's possible to construct a special serialized data packet, which exacerbates the potential harm of these risks. This can be done without needing other dependencies and enables command execution (it seems like process$start is a newly introduced function). The harm from deserialization often depends on the project environment, but this vulnerability does not require any other dependencies and is an issue with the JAR package itself.