This document discusses security slicing for auditing XML, XPath, and SQL injection vulnerabilities. It presents an approach using taint analysis and system dependence graph construction to extract security-relevant program slices. These slices can then be filtered and chopped to aid security auditing. The approach was evaluated on several test subjects and was shown to significantly reduce the number of slices that need to be examined compared to traditional chopping. Future work areas include handling more complex string operations and integrating with constraint solvers.