Chapter 3

Check vulnerabilities