Home Vulnerability Solving the indirect vulnerability enigma