The software makes resources available to untrusted parties when those resources are only intended to be accessed by the software.