Modern applications are often built with a jigsaw puzzle array of different pieces that all fit together to enable a full stack of functionality.
The challenge from a security perspective is that not every organization or application properly validates all the different puzzle pieces, which can be a risky proposition.