Unfortunately, the closest this gets to describing flaws is citing the OWASP top 10 [0].<p>I suppose whenever someone does indeed hack into the system, we'll finally find out the specifics of the weaknesses.<p>[0] - <a href="https://www.owasp.org/index.php/Top_10_2013-Top_10" rel="nofollow">https://www.owasp.org/index.php/Top_10_2013-Top_10</a>