security risk, part 2