A method and system of detecting vulnerabilities in source code. Source
code is parsed into an intermediate representation. Models are derived
for the code and the models are then analyzed in conjunction with
pre-specified rules about the routines to determine if the routine call
posses one or more of pre-selected vulnerabilities.