If your program is a viewer or editor of data—such as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.
If your program is a viewer or editor of data — such as a word processor or image displayer — that data might be from an attacker, so it's an untrusted input.