t('{hasOwnProperty(alert("xss"))}');
demonstrates the translation string as a potential xss vector. It's not hinted anywhere in the API docs that one should stick external vars in the translation string, but it might be helpful to mention that such a thing should be avoided.
In lieu of a disclaimer, it would be possible to remove the vulnerability by splitting tokens by the dot and recursing down obj with string accessors.