• Finding real-world vulnerabilities before attackers do.