Vulnerability-hunting machine