Due to potential legitimate uses of source commands, it's may be difficult to mitigate use of this technique.