1)It verifies that the code asserted the appropriate permission on the
call stack to use the dangerous class.
2)It verifies that the assert (the request to use the dangerous class) was
executed in trusted code and saved in the AOT.
3)It verifies that the assert was executed on the same tier as the
dangerous class.
No comments:
Post a Comment