Tags scope in ethical hacking