22.5 Conclusions:

Securing an app might require some extra work around all the information available as well as all the extra available packages and functions that can be used for authenticating and avoid the wrongful combination of functions/commands.

This might be the case for apps containing sensitive information or for those one letting the users access restricted data.