A common attack is to replace libraries or utilities required by the application
with modified versions of these products. Your application then calls these
products and inadvertently aids in the attack. As mentioned earlier, your
application must carefully check every piece of software outside your TCB.