Assessing the foundation of the Trojan Horse Method