Finding vulnerabilities with Wapiti