This is related to #9
An example scenario:
- User authenticates with a compromised application
- The application is allowed to make modifications to the discovery mechanism
- Compromised application inject location controlled by the attacker for financial records into the discovery mechanisme
- Now other applications storing financial records will store it in the location controlled by the attacker