A code inspection system produces a dynamic decoy machine that closely parallels
one or more protected systems. The code inspection system can analyze and monitor
one or more protected systems, and as those protected systems are updated, altered
or modified, the dynamic decoy machine, in which potentially malicious code is
tested, can also be updated. Thus, the dynamic decoy machine can accurately reflect
the current state of the one or more protected systems such that the potentially
destructive nature, if any, of suspicious code can be evaluated as if it were in
the actual environment of the protected system, without jeopardizing the security
of the protected system.