The BEST way to validate whether a malicious act has actually occurred in an application is to review: