>>> the model is (obviously) good at security
Out of curiosity, are you one of the people who has access to the model? If yes, could you write about your experimental setup in more detail?