Security-Policy Analysis with eXtended Unix Tools