Implications of the Hypothesis
You can find vulnerabilities by looking for the presence of sets of primitives in a system
You can eliminate vulnerabilities you do not know about by invalidating primitive conditions (which eliminates all vulnerabilities with that primitive)
This induces a simple taxonomy with a metric for the difference between vulnerabilities (eg., Hamming distance)