8.2.4 脆弱性识别