I've been curious about this for a while.... Say someone wants to write an exploit for skype, what would the have to do to go about writing one? Would they need to reverse engineer skype to examine code to find bugs in the code to write an exploit for? I'm not sure exactly how the whole process works, if someone could explain it to me i'd really appreciate it!