A case of
ask and you shall receive, I guess.
From what I gather here, the author is exploiting bugs in the SPC700 emulation to figure out where in memory he can place system calls in order to get them run. It's not full-on arbitrary code exploitation nor breaking any system security, but it's still scary this is possible.
Thanks for finding and posting this, menace690!