> Exploitation uses cross-request heap feng shui

First time I’ve seen feng shui used in this manner..?

It's a common and slightly less problematic term for heap grooming.