The author explores the detection of trojan signatures in large language models of code, finding that these signatures are challenging to detect solely from model weights.