What About Malicious
Protocol Objects?