The document discusses defining what constitutes an "exploit" in computer security. It begins by noting that while exploits are a central concept, there is no agreed upon definition. It then examines two potential implementations of a simple intended finite state machine (IFSM) for storing passwords and secrets - a flat array implementation and a linked list implementation. It demonstrates how an attacker could exploit the linked list implementation under a chosen-bitflip-once attacker model by corrupting a single bit of memory to rearrange the linked list and retrieve a secret without knowing the correct password. The document aims to introduce a theoretical framework for reasoning about exploits and differentiating between provably exploitable and unexploitable code.