Return to Article Details Security Tools Based on Large Language Models Download Download PDF