> if someone finds a security vulnerability in a commonly-emitted-by-LLMs code pattern
how do you distinguish this from injecting a vulnerable dependency to a dependency list?
You can more easily check for known-vulnerable dependencies
You can more easily check for known-vulnerable dependencies