What repetition control structure is used as an example? How might easy to read or highly documented code become a security risk?