Searching protocol for "taint-tracing"
Trace data flow across files to map taint paths.
Trace attacker inputs to sinks and origins.