Vulnerabilities in extreme-feedback