Vulnerability Remediation Process Flow Chart - Applying Ai In Application Security