Mechanisms exist to utilize a detonation chamber capability to detect and/or block potentially-malicious files and email attachments.