Dataflow reachability beats function-level
Dataflow reachability traces input patterns from application code into vulnerable dependency code rather than only identifying that the vulnerable function is called. Differentiates reachable-and-exploitable from reachable-but-safe.