Detecting possible XST vulnerabilities