drop session log · detect replay attack patterns · runs locally
drop session log · local only
heuristic screener · vendor schema varies · not definitive proof