Use when requests involve security advisories, CVEs, dependency upgrades, vulnerable packages, patch prioritization, or reducing known security risk across code and dependencies. Operate vulnerability management for application repositories and delivery pipelines: dependency review, advisory triage, patch planning, exposure analysis, compensating controls, and remediation workflow.