YAML Metadata Warning: empty or missing yaml metadata in repo card (https://huggingface.co/docs/hub/model-cards#model-card-metadata)

Quantization made by Richard Erkhov.

Github

Discord

Request more models

phi-1 - GGUF

Name Quant method Size
phi-1.Q2_K.gguf Q2_K 0.54GB
phi-1.IQ3_XS.gguf IQ3_XS 0.59GB
phi-1.IQ3_S.gguf IQ3_S 0.61GB
phi-1.Q3_K_S.gguf Q3_K_S 0.61GB
phi-1.IQ3_M.gguf IQ3_M 0.64GB
phi-1.Q3_K.gguf Q3_K 0.69GB
phi-1.Q3_K_M.gguf Q3_K_M 0.69GB
phi-1.Q3_K_L.gguf Q3_K_L 0.75GB
phi-1.IQ4_XS.gguf IQ4_XS 0.74GB
phi-1.Q4_0.gguf Q4_0 0.77GB
phi-1.IQ4_NL.gguf IQ4_NL 0.78GB
phi-1.Q4_K_S.gguf Q4_K_S 0.78GB
phi-1.Q4_K.gguf Q4_K 0.83GB
phi-1.Q4_K_M.gguf Q4_K_M 0.83GB
phi-1.Q4_1.gguf Q4_1 0.85GB
phi-1.Q5_0.gguf Q5_0 0.92GB
phi-1.Q5_K_S.gguf Q5_K_S 0.92GB
phi-1.Q5_K.gguf Q5_K 0.96GB
phi-1.Q5_K_M.gguf Q5_K_M 0.96GB
phi-1.Q5_1.gguf Q5_1 1.0GB
phi-1.Q6_K.gguf Q6_K 1.09GB

Original model description:

license: mit license_link: https://huggingface.co/microsoft/phi-1/resolve/main/LICENSE language: - en pipeline_tag: text-generation tags: - code

Model Summary

The language model Phi-1 is a Transformer with 1.3 billion parameters, specialized for basic Python coding. Its training involved a variety of data sources, including subsets of Python codes from The Stack v1.2, Q&A content from StackOverflow, competition code from code_contests, and synthetic Python textbooks and exercises generated by gpt-3.5-turbo-0301. Even though the model and the datasets are relatively small compared to contemporary Large Language Models (LLMs), Phi-1 has demonstrated an impressive accuracy rate exceeding 50% on the simple Python coding benchmark, HumanEval.

How to Use

Phi-1 has been integrated in the transformers version 4.37.0. If you are using a lower version, ensure that you are doing the following:

  • When loading the model, ensure that trust_remote_code=True is passed as an argument of the from_pretrained() function.

The current transformers version can be verified with: pip list | grep transformers.

Intended Uses

Given the nature of the training data, Phi-1 is best suited for prompts using the code format:

Code Format:

def print_prime(n):
   """
   Print all primes between 1 and n
   """
   for num in range(2, n+1):
       for i in range(2, num):
           if num % i == 0:
               break
       else:
           print(num)

where the model generates the code after the comments. (Note: This is a legitimate and correct use of the else statement in Python loops.)

Notes:

  • Phi-1 is intended for code purposes. The model-generated code should be treated as a starting point rather than a definitive solution for potential use cases. Users should be cautious when employing this model in their applications.

  • Direct adoption for production coding tasks is out of the scope of this research project. As a result, Phi-1 has not been tested to ensure that it performs adequately for production-level code. Please refer to the limitation sections of this document for more details.

  • If you are using transformers<4.37.0, always load the model with trust_remote_code=True to prevent side-effects.

Sample Code

import torch
from transformers import AutoModelForCausalLM, AutoTokenizer

torch.set_default_device("cuda")

model = AutoModelForCausalLM.from_pretrained("microsoft/phi-1", torch_dtype="auto", trust_remote_code=True)
tokenizer = AutoTokenizer.from_pretrained("microsoft/phi-1", trust_remote_code=True)

inputs = tokenizer('''def print_prime(n):
   """
   Print all primes between 1 and n
   """''', return_tensors="pt", return_attention_mask=False)

outputs = model.generate(**inputs, max_length=200)
text = tokenizer.batch_decode(outputs)[0]
print(text)

Limitations of Phi-1

  • Limited Scope: 99.8% of the Python scripts in our fine-tuning dataset use only the packages "typing, math, random, collections, datetime, itertools". If the model generates Python scripts that utilize other packages, we strongly recommend users manually verify all API uses.

  • Replicate Scripts Online: As our model is trained on Python scripts found online, there is a small chance it may replicate such scripts, especially if they appear repetitively across different online sources.

  • Generate Inaccurate Code: The model frequently generates incorrect code. We suggest that users view these outputs as a source of inspiration rather than definitive solutions.

  • Unreliable Responses to Alternate Formats: Despite appearing to comprehend instructions in formats like Q&A or chat, our models often respond with inaccurate answers, even when seeming confident. Their capabilities with non-code formats are significantly more limited.

  • Limitations on Natural Language Comprehension. As a coding bot, Phi-1's main focus is to help with coding-related questions. While it may have some natural language comprehension capabilities, its primary function is not to engage in general conversations or demonstrate common sense like a general AI assistant. Its strength lies in providing assistance and guidance in the context of programming and software development.

  • Potential Biases: Phi-1, like other AI models, is trained on web and synthetic data. This data can contain biases and errors that might affect the AI's performance. Biases could stem from various sources like unbalanced representation, stereotypes, or controversial opinions present in the training data. As a result, the model might sometimes generate responses that reflect these biases or errors.

Warning about Security Risks

When leveraging Phi-1, it's paramount to be vigilant. The model, though powerful, can inadvertently introduce security vulnerabilities in the generated code. Examples include, but are not limited to:

  • Directory Traversal: The code might fail to implement safe checks against directory traversal attacks, potentially allowing unauthorized access to sensitive files on your system.

  • Injection Attacks: There could be lapses in escaping strings properly, making the application susceptible to SQL, OS commands, or other injection attacks.

  • Misunderstanding Requirements: The model might sometimes misunderstand or oversimplify user requirements, leading to incomplete or insecure solutions.

  • Lack of Input Validation: In some cases, the model might neglect to incorporate input validation or sanitize user inputs, opening doors to attacks like Cross-Site Scripting (XSS).

  • Insecure Defaults: The model might recommend or generate code with insecure default settings, such as weak password requirements or unencrypted data transmissions.

  • Failure in Error Handling: Improper error handling can inadvertently reveal sensitive information about the system or the application's internal workings.

Given these potential pitfalls, and others not explicitly mentioned, it's essential to thoroughly review, test, and verify the generated code before deploying it in any application, especially those that are security-sensitive. Always consult with security experts or perform rigorous penetration testing when in doubt.

Training

Model

  • Architecture: a Transformer-based model with next-word prediction objective

  • Training tokens: 54B tokens (7B unique tokens)

  • Precision: fp16

  • GPUs: 8 A100

  • Training time: 6 days

Software

License

The model is licensed under the MIT license.

Citation

@article{gunasekar2023textbooks,
  title={Textbooks Are All You Need},
  author={Gunasekar, Suriya and Zhang, Yi and Aneja, Jyoti and Mendes, Caio C{\'e}sar Teodoro and Del Giorno, Allie and Gopi, Sivakanth and Javaheripi, Mojan and Kauffmann, Piero and de Rosa, Gustavo and Saarikivi, Olli and others},
  journal={arXiv preprint arXiv:2306.11644},
  year={2023}
}

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft’s Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party’s policies.

Downloads last month
146
GGUF
Model size
1.42B params
Architecture
phi2

2-bit

3-bit

4-bit

5-bit

6-bit

Inference API
Unable to determine this model's library. Check the docs .