What researchers learned about building an LLM security workflow