Typing sound vulnerabilities