traverse and transform objects by visiting every node on a recursive walk
No vulnerabilities detected