How do we validate vulnerabilities have been remediated?