/**
* <p>
* Trust Boundary Violation is fancy name to describe tainted value passed directly to session attribute.
* This could be an expected behavior that allow an attacker to change the session state.
* </p>
* <p>
* When the parameter is dynamic, it is a lot more suspicious than when it is a dynamic value.
* <code>setAttribute( suspiciousValue, "true")</code>
* vs
* <code>setAttribute( "language" , commonDynamicValue)</code>
* </p>
* <p>
* For this reason, the trust boundary violation was split in two detectors.
* This will allow user to hide the low priority of this detector.
* </p>
*
* @see com.h3xstream.findsecbugs.injection.trust.TrustBoundaryViolationAttributeDetector
* @see com.h3xstream.findsecbugs.injection.trust.TrustBoundaryViolationValueDetector
*/
package com.h3xstream.findsecbugs.injection.trust;