Use of 'chroot'
Incorrect usage of 'chroot' can introduce security vulnerabilities and its use should be controlled