Some ideas on what can be attacked: * Are we moving to the next check as quickly as possible when no files of a given type are found and not stopping to run the check anyway? * Can things be run in parallel?