Consider adding a security demand to {0}. This method is accessible from outside its assembly, and might therefore provide ...