How to Identify Vulnerabilities in Open Source Code