Consider 'chain ability' of a given vulnerability. This is probably beyond the scope of {what's current in automatable}, but certain vulnerabilities might be considered more 'beachhead' category (i.e., tending to allow for ingress to a system or software) and others are more effective at lateral movement or secondary instantiation in a blended or staged exploitation attempt. DoDCAR has done some initial work on the additive nature of exploits, but each of those is composed of underlying exploitable vulnerabilities.
This would be a good topic to address when we address #78 (after v2 is set)
@cgyarbrough :
This would be a good topic to address when we address #78 (after v2 is set)