http://haacked.com/archive/2009/06/25/json-hijacking.aspx gets into a
little more detail of what must be possible to exploit this.
This is an issue that is tangential to your problem, but between the
two of them, it makes more sense to deal with objects as the root of
whatever is being sent over the wire than arrays. Note that if your
server never sense a reply to a GET request, this might not be a
problem for you, but I make a habit of always starting with an object
to make sure no one ever accidentally adds a security flaw.