How to spot the nodes that make a temporal network vulnerable