Use of unsanitized external input in reflection can allow attackers to bypass security checks and run malicious code.