Sooo... am I to take it you don't have any examples of what "inventory exploits" are?