While sections 0 through 3 are generally applicable across different types of software,
most of the guidelines in sections 4 through 9 focus on applications that interact with untrusted code (though some guidelines in these sections are still relevant for other situations).