12.2 Searching for corner cases, bugs and security vulnerabilities