An analysis tool provides a call path set for reviewing the security of
trusted software components during development. By examining the usage of
permissions in programs and libraries within a managed execution
environment, potential gaps in the security of trusted components may be
identified. A call graph generator creates a permission-sensitive call
graph. A call graph analyzer evaluates the permission-sensitive call
graph to highlight call paths that may present security risks.