LLMs can identify vulnerability patterns in source code - Models trained on CVE databases can flag similar patterns in new code - Automated exploit generation from vulnerability descriptions is an active research area