An attacker would need to send two carefully crafted emails to the target.

Shift the tone (e.g., for developers or simpler for general users).

Ensure you are using the latest version of any Proton applications.