identifying-security-vulnerabilities