Analysis should include detection of vulnerabilities when using