identify vulnerabilities