Methodological Considerations In Exploit Prediction Systems