On the talk "Hey AI, how many "r" in "buffer overflow"? we discuss how AI models can excel at certain security tasks while surprisingly failing at seemingly simple tasks, and on Hack like a robot: Journey into the logic of LLM-based vulnerability hunters." we explore what happens when LLMs tackle vulnerability discovery, examining their successes, spectacular failures, and surprising insights.