A controlled vulnerability management agent programmable to arm itself and attempt to propagate and extract vulnerabilities from a target network, without input from a user. The agent may also send status and vulnerability information to a unified vulnerability resource management (unified VRM) platform, and may also have the ability to fix vulnerabilities through a real-time control center associated with the unified vulnerability resource management platform.