HIBT code vulnerability scan guide

HIBT code vulnerability scan guide