Testing for Reliance on Untrusted Inputs in a Security Decision