$ 0 0 This would give interceptors easy access to the command tree that was used to create the command being intercepted.