Implementing automated vulnerability scanning