

Any website using CSR only can’t have a RCE because the code runs on the client. Any code capable of RSC that runs server and client side may be vulnerable.
From what I’ve seen, the exploit is a special request from a client that functionally lets you exec anything you want (via Function’s constructor). If your server is unpatched and recognizes the request, it may be (likely is) vulnerable.
I’m sure we’ll get more details over time and tools to manually check if a site is compromised.
A common pattern with executable Python scripts is to:
#!/usr/bin/env python3) to make it easier to execute__name__ == "__main__"before running any of the script so the functions can be imported into another script without running all the code at the bottom