Consider adding a security demand to {0}. The following call stack might expose a way to circumvent security protection: ...