The application may attempt to execute root commands, execute exploits, or embed the metasploit library