Modeling out vulnerabilities