DatasetSubmission commited on
Commit
b6f8bd6
·
verified ·
1 Parent(s): 9b14029

Remove stale benchmark/ v1 directory (superseded by benchmark_v2/)

Browse files
benchmark/benchmark_meta.json DELETED
@@ -1,762 +0,0 @@
1
- {
2
- "task1": {
3
- "task": "exploit_relevance_classification",
4
- "description": "Source-controlled binary classification: given a post or advisory text, predict whether it is CVE-linked exploit-relevant (1) or not (0). Each source/split contributes balanced positives and negatives from the same source to remove source-membership confounding.",
5
- "label_map": {
6
- "0": "not_exploit_relevant",
7
- "1": "exploit_relevant"
8
- },
9
- "candidate_sources": [
10
- "0x00sec",
11
- "cisa_kev",
12
- "cvefixes",
13
- "dtl_exploits",
14
- "evolution",
15
- "exploitdb",
16
- "gayanku",
17
- "github_advisory",
18
- "hacker_exploits",
19
- "hackerone",
20
- "hackersploit",
21
- "hackforums",
22
- "hackthebox",
23
- "kaeli_hacker",
24
- "parrotsec",
25
- "seebug",
26
- "vulnlab",
27
- "zeroday",
28
- "zeroscience"
29
- ],
30
- "labeling_rule": "positive if post ID appears in the same source CVE index; negative if from the same source/split, absent from the CVE index, and containing no CVE token",
31
- "source_split_sampling": {
32
- "zeroscience": {
33
- "train": {
34
- "positive_available": 329,
35
- "negative_available": 448,
36
- "positive_used": 329,
37
- "negative_used": 329
38
- },
39
- "val": {
40
- "positive_available": 102,
41
- "negative_available": 15,
42
- "positive_used": 15,
43
- "negative_used": 15
44
- },
45
- "test": {
46
- "positive_available": 86,
47
- "negative_available": 93,
48
- "positive_used": 86,
49
- "negative_used": 86
50
- }
51
- },
52
- "hackerone": {
53
- "train": {
54
- "positive_available": 425,
55
- "negative_available": 7497,
56
- "positive_used": 425,
57
- "negative_used": 425
58
- },
59
- "val": {
60
- "positive_available": 205,
61
- "negative_available": 1199,
62
- "positive_used": 205,
63
- "negative_used": 205
64
- },
65
- "test": {
66
- "positive_available": 30,
67
- "negative_available": 116,
68
- "positive_used": 30,
69
- "negative_used": 30
70
- }
71
- },
72
- "vulnlab": {
73
- "train": {
74
- "positive_available": 0,
75
- "negative_available": 7,
76
- "positive_used": 0,
77
- "negative_used": 0
78
- },
79
- "val": {
80
- "positive_available": 0,
81
- "negative_available": 1,
82
- "positive_used": 0,
83
- "negative_used": 0
84
- },
85
- "test": {
86
- "positive_available": 63,
87
- "negative_available": 883,
88
- "positive_used": 63,
89
- "negative_used": 63
90
- }
91
- },
92
- "seebug": {
93
- "train": {
94
- "positive_available": 0,
95
- "negative_available": 0,
96
- "positive_used": 0,
97
- "negative_used": 0
98
- },
99
- "val": {
100
- "positive_available": 0,
101
- "negative_available": 0,
102
- "positive_used": 0,
103
- "negative_used": 0
104
- },
105
- "test": {
106
- "positive_available": 38,
107
- "negative_available": 2,
108
- "positive_used": 2,
109
- "negative_used": 2
110
- }
111
- },
112
- "0x00sec": {
113
- "train": {
114
- "positive_available": 0,
115
- "negative_available": 0,
116
- "positive_used": 0,
117
- "negative_used": 0
118
- },
119
- "val": {
120
- "positive_available": 0,
121
- "negative_available": 0,
122
- "positive_used": 0,
123
- "negative_used": 0
124
- },
125
- "test": {
126
- "positive_available": 6,
127
- "negative_available": 326,
128
- "positive_used": 6,
129
- "negative_used": 6
130
- }
131
- },
132
- "hackthebox": {
133
- "train": {
134
- "positive_available": 1,
135
- "negative_available": 836,
136
- "positive_used": 0,
137
- "negative_used": 0
138
- },
139
- "val": {
140
- "positive_available": 0,
141
- "negative_available": 502,
142
- "positive_used": 0,
143
- "negative_used": 0
144
- },
145
- "test": {
146
- "positive_available": 7,
147
- "negative_available": 308,
148
- "positive_used": 7,
149
- "negative_used": 7
150
- }
151
- },
152
- "hackersploit": {
153
- "train": {
154
- "positive_available": 0,
155
- "negative_available": 224,
156
- "positive_used": 0,
157
- "negative_used": 0
158
- },
159
- "val": {
160
- "positive_available": 3,
161
- "negative_available": 89,
162
- "positive_used": 0,
163
- "negative_used": 0
164
- },
165
- "test": {
166
- "positive_available": 0,
167
- "negative_available": 6,
168
- "positive_used": 0,
169
- "negative_used": 0
170
- }
171
- },
172
- "parrotsec": {
173
- "train": {
174
- "positive_available": 1,
175
- "negative_available": 133,
176
- "positive_used": 0,
177
- "negative_used": 0
178
- },
179
- "val": {
180
- "positive_available": 0,
181
- "negative_available": 213,
182
- "positive_used": 0,
183
- "negative_used": 0
184
- },
185
- "test": {
186
- "positive_available": 0,
187
- "negative_available": 65,
188
- "positive_used": 0,
189
- "negative_used": 0
190
- }
191
- },
192
- "gayanku": {
193
- "train": {
194
- "positive_available": 64,
195
- "negative_available": 3810108,
196
- "positive_used": 64,
197
- "negative_used": 64
198
- },
199
- "val": {
200
- "positive_available": 0,
201
- "negative_available": 0,
202
- "positive_used": 0,
203
- "negative_used": 0
204
- },
205
- "test": {
206
- "positive_available": 0,
207
- "negative_available": 0,
208
- "positive_used": 0,
209
- "negative_used": 0
210
- }
211
- },
212
- "evolution": {
213
- "train": {
214
- "positive_available": 11,
215
- "negative_available": 488978,
216
- "positive_used": 11,
217
- "negative_used": 11
218
- },
219
- "val": {
220
- "positive_available": 0,
221
- "negative_available": 0,
222
- "positive_used": 0,
223
- "negative_used": 0
224
- },
225
- "test": {
226
- "positive_available": 0,
227
- "negative_available": 0,
228
- "positive_used": 0,
229
- "negative_used": 0
230
- }
231
- },
232
- "hackforums": {
233
- "train": {
234
- "positive_available": 7,
235
- "negative_available": 152471,
236
- "positive_used": 7,
237
- "negative_used": 7
238
- },
239
- "val": {
240
- "positive_available": 0,
241
- "negative_available": 0,
242
- "positive_used": 0,
243
- "negative_used": 0
244
- },
245
- "test": {
246
- "positive_available": 0,
247
- "negative_available": 0,
248
- "positive_used": 0,
249
- "negative_used": 0
250
- }
251
- },
252
- "dtl_exploits": {
253
- "train": {
254
- "positive_available": 0,
255
- "negative_available": 65411,
256
- "positive_used": 0,
257
- "negative_used": 0
258
- },
259
- "val": {
260
- "positive_available": 0,
261
- "negative_available": 0,
262
- "positive_used": 0,
263
- "negative_used": 0
264
- },
265
- "test": {
266
- "positive_available": 0,
267
- "negative_available": 0,
268
- "positive_used": 0,
269
- "negative_used": 0
270
- }
271
- },
272
- "github_advisory": {
273
- "train": {
274
- "positive_available": 0,
275
- "negative_available": 5367,
276
- "positive_used": 0,
277
- "negative_used": 0
278
- },
279
- "val": {
280
- "positive_available": 0,
281
- "negative_available": 11256,
282
- "positive_used": 0,
283
- "negative_used": 0
284
- },
285
- "test": {
286
- "positive_available": 0,
287
- "negative_available": 10401,
288
- "positive_used": 0,
289
- "negative_used": 0
290
- }
291
- },
292
- "cvefixes": {
293
- "train": {
294
- "positive_available": 6770,
295
- "negative_available": 0,
296
- "positive_used": 0,
297
- "negative_used": 0
298
- },
299
- "val": {
300
- "positive_available": 1592,
301
- "negative_available": 0,
302
- "positive_used": 0,
303
- "negative_used": 0
304
- },
305
- "test": {
306
- "positive_available": 0,
307
- "negative_available": 0,
308
- "positive_used": 0,
309
- "negative_used": 0
310
- }
311
- },
312
- "zeroday": {
313
- "train": {
314
- "positive_available": 0,
315
- "negative_available": 16519,
316
- "positive_used": 0,
317
- "negative_used": 0
318
- },
319
- "val": {
320
- "positive_available": 0,
321
- "negative_available": 0,
322
- "positive_used": 0,
323
- "negative_used": 0
324
- },
325
- "test": {
326
- "positive_available": 0,
327
- "negative_available": 0,
328
- "positive_used": 0,
329
- "negative_used": 0
330
- }
331
- },
332
- "hacker_exploits": {
333
- "train": {
334
- "positive_available": 0,
335
- "negative_available": 2363249,
336
- "positive_used": 0,
337
- "negative_used": 0
338
- },
339
- "val": {
340
- "positive_available": 0,
341
- "negative_available": 52,
342
- "positive_used": 0,
343
- "negative_used": 0
344
- },
345
- "test": {
346
- "positive_available": 0,
347
- "negative_available": 452664,
348
- "positive_used": 0,
349
- "negative_used": 0
350
- }
351
- },
352
- "kaeli_hacker": {
353
- "train": {
354
- "positive_available": 0,
355
- "negative_available": 258189,
356
- "positive_used": 0,
357
- "negative_used": 0
358
- },
359
- "val": {
360
- "positive_available": 0,
361
- "negative_available": 0,
362
- "positive_used": 0,
363
- "negative_used": 0
364
- },
365
- "test": {
366
- "positive_available": 0,
367
- "negative_available": 455,
368
- "positive_used": 0,
369
- "negative_used": 0
370
- }
371
- },
372
- "cisa_kev": {
373
- "train": {
374
- "positive_available": 0,
375
- "negative_available": 281,
376
- "positive_used": 0,
377
- "negative_used": 0
378
- },
379
- "val": {
380
- "positive_available": 0,
381
- "negative_available": 685,
382
- "positive_used": 0,
383
- "negative_used": 0
384
- },
385
- "test": {
386
- "positive_available": 0,
387
- "negative_available": 483,
388
- "positive_used": 0,
389
- "negative_used": 0
390
- }
391
- }
392
- },
393
- "split_boundaries": {
394
- "train_end": "2022-01-01",
395
- "val_end": "2024-01-01"
396
- },
397
- "metrics": [
398
- "f1_macro",
399
- "f1_positive",
400
- "auc_roc",
401
- "precision",
402
- "recall"
403
- ],
404
- "splits": {
405
- "train": 1672,
406
- "val": 440,
407
- "test": 388
408
- },
409
- "label_distribution_by_split": {
410
- "train": {
411
- "0": 836,
412
- "1": 836
413
- },
414
- "val": {
415
- "0": 220,
416
- "1": 220
417
- },
418
- "test": {
419
- "0": 194,
420
- "1": 194
421
- }
422
- },
423
- "total": 2500
424
- },
425
- "task2": {
426
- "task": "cve_linkage_retrieval",
427
- "description": "Retrieval task: given a post or advisory text, retrieve the correct NVD CVE record from a corpus of ~340K CVE descriptions. Evaluated as a ranking problem.",
428
- "query_sources": [
429
- "exploitdb",
430
- "dtl_exploits",
431
- "github_advisory",
432
- "hackerone",
433
- "zeroscience",
434
- "vulnlab",
435
- "cisa_kev",
436
- "zeroday",
437
- "cvefixes"
438
- ],
439
- "quality_controlled": true,
440
- "quality_sources": [
441
- "cisa_kev",
442
- "cvefixes",
443
- "dtl_exploits",
444
- "hackerone"
445
- ],
446
- "min_query_tokens": 8,
447
- "query_text_rule": "exploit_text, falling back to title when body text is absent",
448
- "skipped": {
449
- "quality_source_filter": 50561,
450
- "empty_or_short_query": 0,
451
- "duplicate": 0,
452
- "missing_id_or_cve": 0
453
- },
454
- "corpus_source": "nvd",
455
- "corpus_size": 340536,
456
- "unique_query_cves": 31748,
457
- "split_boundaries": {
458
- "train_end": "2022-01-01",
459
- "val_end": "2024-01-01"
460
- },
461
- "metrics": [
462
- "recall_at_1",
463
- "recall_at_5",
464
- "recall_at_10",
465
- "mrr"
466
- ],
467
- "splits": {
468
- "train": 40698,
469
- "val": 2551,
470
- "test": 550
471
- },
472
- "query_source_distribution_by_split": {
473
- "train": {
474
- "cisa_kev": 311,
475
- "cvefixes": 6770,
476
- "dtl_exploits": 33015,
477
- "hackerone": 602
478
- },
479
- "val": {
480
- "cisa_kev": 742,
481
- "cvefixes": 1592,
482
- "hackerone": 217
483
- },
484
- "test": {
485
- "cisa_kev": 515,
486
- "hackerone": 35
487
- }
488
- },
489
- "total_queries": 43799
490
- },
491
- "task3": {
492
- "task": "severity_prediction",
493
- "description": "4-class classification: given an advisory or post text, predict the vulnerability severity as critical / high / medium / low.",
494
- "label_map": {
495
- "0": "low",
496
- "1": "medium",
497
- "2": "high",
498
- "3": "critical"
499
- },
500
- "sources": [
501
- "cisa_kev",
502
- "github_advisory",
503
- "hackerone",
504
- "vulnlab",
505
- "zeroscience"
506
- ],
507
- "split_boundaries": {
508
- "train_end": "2022-01-01",
509
- "val_end": "2024-01-01"
510
- },
511
- "metrics": [
512
- "f1_macro",
513
- "accuracy",
514
- "f1_per_class"
515
- ],
516
- "text_preprocessing": "explicit severity and CVSS label strings stripped from model input after label extraction",
517
- "class_distribution": {
518
- "high": 10497,
519
- "medium": 13074,
520
- "critical": 5649,
521
- "low": 2124
522
- },
523
- "class_distribution_by_split": {
524
- "train": {
525
- "critical": 1589,
526
- "high": 2537,
527
- "low": 415,
528
- "medium": 2256
529
- },
530
- "val": {
531
- "critical": 2294,
532
- "high": 4142,
533
- "low": 602,
534
- "medium": 5798
535
- },
536
- "test": {
537
- "critical": 1766,
538
- "high": 3818,
539
- "low": 1107,
540
- "medium": 5020
541
- }
542
- },
543
- "splits": {
544
- "train": 6797,
545
- "val": 12836,
546
- "test": 11711
547
- },
548
- "total": 31344
549
- },
550
- "task4": {
551
- "task": "hacker_exploit_labeling",
552
- "description": "Ternary weak-supervision task over hacker-community messages: non-exploit/noise, vulnerability discussion, or actionable exploit intelligence.",
553
- "label_map": {
554
- "0": "non_exploit_noise",
555
- "1": "vulnerability_discussion",
556
- "2": "actionable_exploit"
557
- },
558
- "sources": [
559
- "hacker_exploits",
560
- "cve_hacker_forum",
561
- "hackforums",
562
- "hackerone",
563
- "dtl_exploits",
564
- "exploitdb_hf",
565
- "gayanku",
566
- "evolution",
567
- "hackersploit",
568
- "hackthebox",
569
- "0x00sec",
570
- "kaeli_hacker"
571
- ],
572
- "labeling_rule": "actionable_exploit if a source CVE linkage is present and the message contains an actionability cue; vulnerability_discussion if a CVE/vulnerability cue is present without actionability; non_exploit_noise otherwise",
573
- "actionability_terms": [
574
- "exploit",
575
- "proof of concept",
576
- "poc",
577
- "metasploit",
578
- "payload",
579
- "shellcode",
580
- "reverse shell",
581
- "privilege escalation",
582
- "remote code execution",
583
- "rce",
584
- "sql injection",
585
- "xss",
586
- "csrf",
587
- "command injection",
588
- "buffer overflow",
589
- "use-after-free",
590
- "deserialization",
591
- "bypass",
592
- "scanner",
593
- "wpscan",
594
- "root shell"
595
- ],
596
- "vulnerability_terms": [
597
- "cve-",
598
- "vulnerability",
599
- "vulnerable",
600
- "patch",
601
- "advisory",
602
- "severity",
603
- "cvss",
604
- "zero-day",
605
- "0day"
606
- ],
607
- "min_tokens": 12,
608
- "max_per_label_split": 100000,
609
- "skipped": {
610
- "missing_file": 0,
611
- "missing_date": 0,
612
- "short_text": 906583
613
- },
614
- "split_boundaries": {
615
- "train_end": "2022-01-01",
616
- "val_end": "2024-01-01"
617
- },
618
- "metrics": [
619
- "f1_macro",
620
- "accuracy",
621
- "f1_per_class"
622
- ],
623
- "splits": {
624
- "train": 200382,
625
- "val": 1933,
626
- "test": 100963
627
- },
628
- "label_distribution_by_split": {
629
- "train": {
630
- "0": 100000,
631
- "1": 100000,
632
- "2": 382
633
- },
634
- "val": {
635
- "0": 1216,
636
- "1": 571,
637
- "2": 146
638
- },
639
- "test": {
640
- "0": 100000,
641
- "1": 926,
642
- "2": 37
643
- }
644
- },
645
- "source_distribution_by_split": {
646
- "train": {
647
- "cve_hacker_forum": 58,
648
- "dtl_exploits": 67643,
649
- "evolution": 7864,
650
- "exploitdb_hf": 1016,
651
- "gayanku": 67852,
652
- "hacker_exploits": 43967,
653
- "hackerone": 2892,
654
- "hackersploit": 11,
655
- "hackforums": 2193,
656
- "hackthebox": 13,
657
- "kaeli_hacker": 6873
658
- },
659
- "val": {
660
- "hacker_exploits": 46,
661
- "hackerone": 1402,
662
- "hackersploit": 77,
663
- "hackthebox": 408
664
- },
665
- "test": {
666
- "0x00sec": 100,
667
- "cve_hacker_forum": 2,
668
- "hacker_exploits": 100586,
669
- "hackerone": 101,
670
- "hackersploit": 1,
671
- "hackthebox": 73,
672
- "kaeli_hacker": 100
673
- }
674
- },
675
- "total": 303278
676
- },
677
- "task5": {
678
- "task": "hacker_exploit_signal_detection",
679
- "description": "Joint task: given a hacker-community message, detect whether it contains actionable exploit intelligence and, when actionable, recover the associated NVD CVE context.",
680
- "label_map": {
681
- "0": "not_actionable_exploit_signal",
682
- "1": "actionable_exploit_signal"
683
- },
684
- "sources": [
685
- "hacker_exploits",
686
- "cve_hacker_forum",
687
- "hackforums",
688
- "hackerone",
689
- "dtl_exploits",
690
- "exploitdb_hf",
691
- "gayanku",
692
- "evolution",
693
- "hackersploit",
694
- "hackthebox",
695
- "0x00sec",
696
- "kaeli_hacker"
697
- ],
698
- "labeling_rule": "positive examples are Task 4 actionable_exploit records with CVE metadata",
699
- "negative_sampling": "up to two non-actionable messages per actionable message within each temporal split",
700
- "corpus_source": "nvd",
701
- "corpus_size": 340536,
702
- "unique_actionable_cves": 420,
703
- "split_boundaries": {
704
- "train_end": "2022-01-01",
705
- "val_end": "2024-01-01"
706
- },
707
- "metrics": [
708
- "f1_actionable",
709
- "recall_at_1",
710
- "recall_at_5",
711
- "recall_at_10",
712
- "mrr",
713
- "joint_recall_at_5"
714
- ],
715
- "splits": {
716
- "train": 1146,
717
- "val": 438,
718
- "test": 111
719
- },
720
- "label_distribution_by_split": {
721
- "train": {
722
- "0": 764,
723
- "1": 382
724
- },
725
- "val": {
726
- "0": 292,
727
- "1": 146
728
- },
729
- "test": {
730
- "0": 74,
731
- "1": 37
732
- }
733
- },
734
- "source_distribution_by_split": {
735
- "train": {
736
- "cve_hacker_forum": 2,
737
- "dtl_exploits": 267,
738
- "evolution": 37,
739
- "exploitdb_hf": 13,
740
- "gayanku": 296,
741
- "hacker_exploits": 162,
742
- "hackerone": 328,
743
- "hackforums": 12,
744
- "hackthebox": 1,
745
- "kaeli_hacker": 28
746
- },
747
- "val": {
748
- "hacker_exploits": 10,
749
- "hackerone": 358,
750
- "hackersploit": 15,
751
- "hackthebox": 55
752
- },
753
- "test": {
754
- "0x00sec": 6,
755
- "hacker_exploits": 74,
756
- "hackerone": 26,
757
- "hackthebox": 5
758
- }
759
- },
760
- "total": 1695
761
- }
762
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
benchmark/gpt5_zero_shot_results.json DELETED
@@ -1 +0,0 @@
1
- {}
 
 
benchmark/task1_exploit_clf/meta.json DELETED
@@ -1,423 +0,0 @@
1
- {
2
- "task": "exploit_relevance_classification",
3
- "description": "Source-controlled binary classification: given a post or advisory text, predict whether it is CVE-linked exploit-relevant (1) or not (0). Each source/split contributes balanced positives and negatives from the same source to remove source-membership confounding.",
4
- "label_map": {
5
- "0": "not_exploit_relevant",
6
- "1": "exploit_relevant"
7
- },
8
- "candidate_sources": [
9
- "0x00sec",
10
- "cisa_kev",
11
- "cvefixes",
12
- "dtl_exploits",
13
- "evolution",
14
- "exploitdb",
15
- "gayanku",
16
- "github_advisory",
17
- "hacker_exploits",
18
- "hackerone",
19
- "hackersploit",
20
- "hackforums",
21
- "hackthebox",
22
- "kaeli_hacker",
23
- "parrotsec",
24
- "seebug",
25
- "vulnlab",
26
- "zeroday",
27
- "zeroscience"
28
- ],
29
- "labeling_rule": "positive if post ID appears in the same source CVE index; negative if from the same source/split, absent from the CVE index, and containing no CVE token",
30
- "source_split_sampling": {
31
- "zeroscience": {
32
- "train": {
33
- "positive_available": 329,
34
- "negative_available": 448,
35
- "positive_used": 329,
36
- "negative_used": 329
37
- },
38
- "val": {
39
- "positive_available": 102,
40
- "negative_available": 15,
41
- "positive_used": 15,
42
- "negative_used": 15
43
- },
44
- "test": {
45
- "positive_available": 86,
46
- "negative_available": 93,
47
- "positive_used": 86,
48
- "negative_used": 86
49
- }
50
- },
51
- "hackerone": {
52
- "train": {
53
- "positive_available": 425,
54
- "negative_available": 7497,
55
- "positive_used": 425,
56
- "negative_used": 425
57
- },
58
- "val": {
59
- "positive_available": 205,
60
- "negative_available": 1199,
61
- "positive_used": 205,
62
- "negative_used": 205
63
- },
64
- "test": {
65
- "positive_available": 30,
66
- "negative_available": 116,
67
- "positive_used": 30,
68
- "negative_used": 30
69
- }
70
- },
71
- "vulnlab": {
72
- "train": {
73
- "positive_available": 0,
74
- "negative_available": 7,
75
- "positive_used": 0,
76
- "negative_used": 0
77
- },
78
- "val": {
79
- "positive_available": 0,
80
- "negative_available": 1,
81
- "positive_used": 0,
82
- "negative_used": 0
83
- },
84
- "test": {
85
- "positive_available": 63,
86
- "negative_available": 883,
87
- "positive_used": 63,
88
- "negative_used": 63
89
- }
90
- },
91
- "seebug": {
92
- "train": {
93
- "positive_available": 0,
94
- "negative_available": 0,
95
- "positive_used": 0,
96
- "negative_used": 0
97
- },
98
- "val": {
99
- "positive_available": 0,
100
- "negative_available": 0,
101
- "positive_used": 0,
102
- "negative_used": 0
103
- },
104
- "test": {
105
- "positive_available": 38,
106
- "negative_available": 2,
107
- "positive_used": 2,
108
- "negative_used": 2
109
- }
110
- },
111
- "0x00sec": {
112
- "train": {
113
- "positive_available": 0,
114
- "negative_available": 0,
115
- "positive_used": 0,
116
- "negative_used": 0
117
- },
118
- "val": {
119
- "positive_available": 0,
120
- "negative_available": 0,
121
- "positive_used": 0,
122
- "negative_used": 0
123
- },
124
- "test": {
125
- "positive_available": 6,
126
- "negative_available": 326,
127
- "positive_used": 6,
128
- "negative_used": 6
129
- }
130
- },
131
- "hackthebox": {
132
- "train": {
133
- "positive_available": 1,
134
- "negative_available": 836,
135
- "positive_used": 0,
136
- "negative_used": 0
137
- },
138
- "val": {
139
- "positive_available": 0,
140
- "negative_available": 502,
141
- "positive_used": 0,
142
- "negative_used": 0
143
- },
144
- "test": {
145
- "positive_available": 7,
146
- "negative_available": 308,
147
- "positive_used": 7,
148
- "negative_used": 7
149
- }
150
- },
151
- "hackersploit": {
152
- "train": {
153
- "positive_available": 0,
154
- "negative_available": 224,
155
- "positive_used": 0,
156
- "negative_used": 0
157
- },
158
- "val": {
159
- "positive_available": 3,
160
- "negative_available": 89,
161
- "positive_used": 0,
162
- "negative_used": 0
163
- },
164
- "test": {
165
- "positive_available": 0,
166
- "negative_available": 6,
167
- "positive_used": 0,
168
- "negative_used": 0
169
- }
170
- },
171
- "parrotsec": {
172
- "train": {
173
- "positive_available": 1,
174
- "negative_available": 133,
175
- "positive_used": 0,
176
- "negative_used": 0
177
- },
178
- "val": {
179
- "positive_available": 0,
180
- "negative_available": 213,
181
- "positive_used": 0,
182
- "negative_used": 0
183
- },
184
- "test": {
185
- "positive_available": 0,
186
- "negative_available": 65,
187
- "positive_used": 0,
188
- "negative_used": 0
189
- }
190
- },
191
- "gayanku": {
192
- "train": {
193
- "positive_available": 64,
194
- "negative_available": 3810108,
195
- "positive_used": 64,
196
- "negative_used": 64
197
- },
198
- "val": {
199
- "positive_available": 0,
200
- "negative_available": 0,
201
- "positive_used": 0,
202
- "negative_used": 0
203
- },
204
- "test": {
205
- "positive_available": 0,
206
- "negative_available": 0,
207
- "positive_used": 0,
208
- "negative_used": 0
209
- }
210
- },
211
- "evolution": {
212
- "train": {
213
- "positive_available": 11,
214
- "negative_available": 488978,
215
- "positive_used": 11,
216
- "negative_used": 11
217
- },
218
- "val": {
219
- "positive_available": 0,
220
- "negative_available": 0,
221
- "positive_used": 0,
222
- "negative_used": 0
223
- },
224
- "test": {
225
- "positive_available": 0,
226
- "negative_available": 0,
227
- "positive_used": 0,
228
- "negative_used": 0
229
- }
230
- },
231
- "hackforums": {
232
- "train": {
233
- "positive_available": 7,
234
- "negative_available": 152471,
235
- "positive_used": 7,
236
- "negative_used": 7
237
- },
238
- "val": {
239
- "positive_available": 0,
240
- "negative_available": 0,
241
- "positive_used": 0,
242
- "negative_used": 0
243
- },
244
- "test": {
245
- "positive_available": 0,
246
- "negative_available": 0,
247
- "positive_used": 0,
248
- "negative_used": 0
249
- }
250
- },
251
- "dtl_exploits": {
252
- "train": {
253
- "positive_available": 0,
254
- "negative_available": 65411,
255
- "positive_used": 0,
256
- "negative_used": 0
257
- },
258
- "val": {
259
- "positive_available": 0,
260
- "negative_available": 0,
261
- "positive_used": 0,
262
- "negative_used": 0
263
- },
264
- "test": {
265
- "positive_available": 0,
266
- "negative_available": 0,
267
- "positive_used": 0,
268
- "negative_used": 0
269
- }
270
- },
271
- "github_advisory": {
272
- "train": {
273
- "positive_available": 0,
274
- "negative_available": 5367,
275
- "positive_used": 0,
276
- "negative_used": 0
277
- },
278
- "val": {
279
- "positive_available": 0,
280
- "negative_available": 11256,
281
- "positive_used": 0,
282
- "negative_used": 0
283
- },
284
- "test": {
285
- "positive_available": 0,
286
- "negative_available": 10401,
287
- "positive_used": 0,
288
- "negative_used": 0
289
- }
290
- },
291
- "cvefixes": {
292
- "train": {
293
- "positive_available": 6770,
294
- "negative_available": 0,
295
- "positive_used": 0,
296
- "negative_used": 0
297
- },
298
- "val": {
299
- "positive_available": 1592,
300
- "negative_available": 0,
301
- "positive_used": 0,
302
- "negative_used": 0
303
- },
304
- "test": {
305
- "positive_available": 0,
306
- "negative_available": 0,
307
- "positive_used": 0,
308
- "negative_used": 0
309
- }
310
- },
311
- "zeroday": {
312
- "train": {
313
- "positive_available": 0,
314
- "negative_available": 16519,
315
- "positive_used": 0,
316
- "negative_used": 0
317
- },
318
- "val": {
319
- "positive_available": 0,
320
- "negative_available": 0,
321
- "positive_used": 0,
322
- "negative_used": 0
323
- },
324
- "test": {
325
- "positive_available": 0,
326
- "negative_available": 0,
327
- "positive_used": 0,
328
- "negative_used": 0
329
- }
330
- },
331
- "hacker_exploits": {
332
- "train": {
333
- "positive_available": 0,
334
- "negative_available": 2363249,
335
- "positive_used": 0,
336
- "negative_used": 0
337
- },
338
- "val": {
339
- "positive_available": 0,
340
- "negative_available": 52,
341
- "positive_used": 0,
342
- "negative_used": 0
343
- },
344
- "test": {
345
- "positive_available": 0,
346
- "negative_available": 452664,
347
- "positive_used": 0,
348
- "negative_used": 0
349
- }
350
- },
351
- "kaeli_hacker": {
352
- "train": {
353
- "positive_available": 0,
354
- "negative_available": 258189,
355
- "positive_used": 0,
356
- "negative_used": 0
357
- },
358
- "val": {
359
- "positive_available": 0,
360
- "negative_available": 0,
361
- "positive_used": 0,
362
- "negative_used": 0
363
- },
364
- "test": {
365
- "positive_available": 0,
366
- "negative_available": 455,
367
- "positive_used": 0,
368
- "negative_used": 0
369
- }
370
- },
371
- "cisa_kev": {
372
- "train": {
373
- "positive_available": 0,
374
- "negative_available": 281,
375
- "positive_used": 0,
376
- "negative_used": 0
377
- },
378
- "val": {
379
- "positive_available": 0,
380
- "negative_available": 685,
381
- "positive_used": 0,
382
- "negative_used": 0
383
- },
384
- "test": {
385
- "positive_available": 0,
386
- "negative_available": 483,
387
- "positive_used": 0,
388
- "negative_used": 0
389
- }
390
- }
391
- },
392
- "split_boundaries": {
393
- "train_end": "2022-01-01",
394
- "val_end": "2024-01-01"
395
- },
396
- "metrics": [
397
- "f1_macro",
398
- "f1_positive",
399
- "auc_roc",
400
- "precision",
401
- "recall"
402
- ],
403
- "splits": {
404
- "train": 1672,
405
- "val": 440,
406
- "test": 388
407
- },
408
- "label_distribution_by_split": {
409
- "train": {
410
- "0": 836,
411
- "1": 836
412
- },
413
- "val": {
414
- "0": 220,
415
- "1": 220
416
- },
417
- "test": {
418
- "0": 194,
419
- "1": 194
420
- }
421
- },
422
- "total": 2500
423
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
benchmark/task1_exploit_clf/test.jsonl DELETED
The diff for this file is too large to render. See raw diff
 
benchmark/task1_exploit_clf/train.jsonl DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:18140bc7a58af1a279b20815fda9ac447ade0321016bf6ac9e99aa640afdc530
3
- size 131983583
 
 
 
 
benchmark/task1_exploit_clf/val.jsonl DELETED
The diff for this file is too large to render. See raw diff
 
benchmark/task2_cve_linkage/corpus.jsonl DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:875266e9e23a9e7862fe31c0d96ef1ed27828390ab34fa31a4f679feca5d60f8
3
- size 123194610
 
 
 
 
benchmark/task2_cve_linkage/meta.json DELETED
@@ -1,66 +0,0 @@
1
- {
2
- "task": "cve_linkage_retrieval",
3
- "description": "Retrieval task: given a post or advisory text, retrieve the correct NVD CVE record from a corpus of ~340K CVE descriptions. Evaluated as a ranking problem.",
4
- "query_sources": [
5
- "exploitdb",
6
- "dtl_exploits",
7
- "github_advisory",
8
- "hackerone",
9
- "zeroscience",
10
- "vulnlab",
11
- "cisa_kev",
12
- "zeroday",
13
- "cvefixes"
14
- ],
15
- "quality_controlled": true,
16
- "quality_sources": [
17
- "cisa_kev",
18
- "cvefixes",
19
- "dtl_exploits",
20
- "hackerone"
21
- ],
22
- "min_query_tokens": 8,
23
- "query_text_rule": "exploit_text, falling back to title when body text is absent",
24
- "skipped": {
25
- "quality_source_filter": 50561,
26
- "empty_or_short_query": 0,
27
- "duplicate": 0,
28
- "missing_id_or_cve": 0
29
- },
30
- "corpus_source": "nvd",
31
- "corpus_size": 340536,
32
- "unique_query_cves": 31748,
33
- "split_boundaries": {
34
- "train_end": "2022-01-01",
35
- "val_end": "2024-01-01"
36
- },
37
- "metrics": [
38
- "recall_at_1",
39
- "recall_at_5",
40
- "recall_at_10",
41
- "mrr"
42
- ],
43
- "splits": {
44
- "train": 40698,
45
- "val": 2551,
46
- "test": 550
47
- },
48
- "query_source_distribution_by_split": {
49
- "train": {
50
- "cisa_kev": 311,
51
- "cvefixes": 6770,
52
- "dtl_exploits": 33015,
53
- "hackerone": 602
54
- },
55
- "val": {
56
- "cisa_kev": 742,
57
- "cvefixes": 1592,
58
- "hackerone": 217
59
- },
60
- "test": {
61
- "cisa_kev": 515,
62
- "hackerone": 35
63
- }
64
- },
65
- "total_queries": 43799
66
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
benchmark/task2_cve_linkage/test.jsonl DELETED
The diff for this file is too large to render. See raw diff
 
benchmark/task2_cve_linkage/train.jsonl DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:2afc4d49dbfd0b67d0a639f8b76cfb7cd884fe327b2f56c3cf7297881459926d
3
- size 28624657
 
 
 
 
benchmark/task2_cve_linkage/val.jsonl DELETED
The diff for this file is too large to render. See raw diff
 
benchmark/task3_severity/meta.json DELETED
@@ -1,59 +0,0 @@
1
- {
2
- "task": "severity_prediction",
3
- "description": "4-class classification: given an advisory or post text, predict the vulnerability severity as critical / high / medium / low.",
4
- "label_map": {
5
- "0": "low",
6
- "1": "medium",
7
- "2": "high",
8
- "3": "critical"
9
- },
10
- "sources": [
11
- "cisa_kev",
12
- "github_advisory",
13
- "hackerone",
14
- "vulnlab",
15
- "zeroscience"
16
- ],
17
- "split_boundaries": {
18
- "train_end": "2022-01-01",
19
- "val_end": "2024-01-01"
20
- },
21
- "metrics": [
22
- "f1_macro",
23
- "accuracy",
24
- "f1_per_class"
25
- ],
26
- "text_preprocessing": "explicit severity and CVSS label strings stripped from model input after label extraction",
27
- "class_distribution": {
28
- "high": 10497,
29
- "medium": 13074,
30
- "critical": 5649,
31
- "low": 2124
32
- },
33
- "class_distribution_by_split": {
34
- "train": {
35
- "critical": 1589,
36
- "high": 2537,
37
- "low": 415,
38
- "medium": 2256
39
- },
40
- "val": {
41
- "critical": 2294,
42
- "high": 4142,
43
- "low": 602,
44
- "medium": 5798
45
- },
46
- "test": {
47
- "critical": 1766,
48
- "high": 3818,
49
- "low": 1107,
50
- "medium": 5020
51
- }
52
- },
53
- "splits": {
54
- "train": 6797,
55
- "val": 12836,
56
- "test": 11711
57
- },
58
- "total": 31344
59
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
benchmark/task3_severity/test.jsonl DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:3e42efdea1356047e3a39243bea14e4b13ba23d25e569345ca605442e59d5ed0
3
- size 33620762
 
 
 
 
benchmark/task3_severity/train.jsonl DELETED
The diff for this file is too large to render. See raw diff
 
benchmark/task3_severity/val.jsonl DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:44df3afa1acd3b296a37aa431d905e7aeb64202f71091e1a1f6e3c9fd05dfafc
3
- size 17221036
 
 
 
 
benchmark/task4_hacker_exploit_labeling/meta.json DELETED
@@ -1,127 +0,0 @@
1
- {
2
- "task": "hacker_exploit_labeling",
3
- "description": "Ternary weak-supervision task over hacker-community messages: non-exploit/noise, vulnerability discussion, or actionable exploit intelligence.",
4
- "label_map": {
5
- "0": "non_exploit_noise",
6
- "1": "vulnerability_discussion",
7
- "2": "actionable_exploit"
8
- },
9
- "sources": [
10
- "hacker_exploits",
11
- "cve_hacker_forum",
12
- "hackforums",
13
- "hackerone",
14
- "dtl_exploits",
15
- "exploitdb_hf",
16
- "gayanku",
17
- "evolution",
18
- "hackersploit",
19
- "hackthebox",
20
- "0x00sec",
21
- "kaeli_hacker"
22
- ],
23
- "labeling_rule": "actionable_exploit if a source CVE linkage is present and the message contains an actionability cue; vulnerability_discussion if a CVE/vulnerability cue is present without actionability; non_exploit_noise otherwise",
24
- "actionability_terms": [
25
- "exploit",
26
- "proof of concept",
27
- "poc",
28
- "metasploit",
29
- "payload",
30
- "shellcode",
31
- "reverse shell",
32
- "privilege escalation",
33
- "remote code execution",
34
- "rce",
35
- "sql injection",
36
- "xss",
37
- "csrf",
38
- "command injection",
39
- "buffer overflow",
40
- "use-after-free",
41
- "deserialization",
42
- "bypass",
43
- "scanner",
44
- "wpscan",
45
- "root shell"
46
- ],
47
- "vulnerability_terms": [
48
- "cve-",
49
- "vulnerability",
50
- "vulnerable",
51
- "patch",
52
- "advisory",
53
- "severity",
54
- "cvss",
55
- "zero-day",
56
- "0day"
57
- ],
58
- "min_tokens": 12,
59
- "max_per_label_split": 100000,
60
- "skipped": {
61
- "missing_file": 0,
62
- "missing_date": 0,
63
- "short_text": 906583
64
- },
65
- "split_boundaries": {
66
- "train_end": "2022-01-01",
67
- "val_end": "2024-01-01"
68
- },
69
- "metrics": [
70
- "f1_macro",
71
- "accuracy",
72
- "f1_per_class"
73
- ],
74
- "splits": {
75
- "train": 200382,
76
- "val": 1933,
77
- "test": 100963
78
- },
79
- "label_distribution_by_split": {
80
- "train": {
81
- "0": 100000,
82
- "1": 100000,
83
- "2": 382
84
- },
85
- "val": {
86
- "0": 1216,
87
- "1": 571,
88
- "2": 146
89
- },
90
- "test": {
91
- "0": 100000,
92
- "1": 926,
93
- "2": 37
94
- }
95
- },
96
- "source_distribution_by_split": {
97
- "train": {
98
- "cve_hacker_forum": 58,
99
- "dtl_exploits": 67643,
100
- "evolution": 7864,
101
- "exploitdb_hf": 1016,
102
- "gayanku": 67852,
103
- "hacker_exploits": 43967,
104
- "hackerone": 2892,
105
- "hackersploit": 11,
106
- "hackforums": 2193,
107
- "hackthebox": 13,
108
- "kaeli_hacker": 6873
109
- },
110
- "val": {
111
- "hacker_exploits": 46,
112
- "hackerone": 1402,
113
- "hackersploit": 77,
114
- "hackthebox": 408
115
- },
116
- "test": {
117
- "0x00sec": 100,
118
- "cve_hacker_forum": 2,
119
- "hacker_exploits": 100586,
120
- "hackerone": 101,
121
- "hackersploit": 1,
122
- "hackthebox": 73,
123
- "kaeli_hacker": 100
124
- }
125
- },
126
- "total": 303278
127
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
benchmark/task4_hacker_exploit_labeling/test.jsonl DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:1981fc345bfe8e9eb5f65512bfa5f4693de5a21436fe6e3923250224bae36d2a
3
- size 95971659
 
 
 
 
benchmark/task4_hacker_exploit_labeling/train.jsonl DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:d52fbb2870a66644fbcc4f0481269d9f0b2483ac94700aa8629d01cbce109abd
3
- size 302150634
 
 
 
 
benchmark/task4_hacker_exploit_labeling/val.jsonl DELETED
The diff for this file is too large to render. See raw diff
 
benchmark/task5_hacker_signal_detection/corpus.jsonl DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:875266e9e23a9e7862fe31c0d96ef1ed27828390ab34fa31a4f679feca5d60f8
3
- size 123194610
 
 
 
 
benchmark/task5_hacker_signal_detection/meta.json DELETED
@@ -1,85 +0,0 @@
1
- {
2
- "task": "hacker_exploit_signal_detection",
3
- "description": "Joint task: given a hacker-community message, detect whether it contains actionable exploit intelligence and, when actionable, recover the associated NVD CVE context.",
4
- "label_map": {
5
- "0": "not_actionable_exploit_signal",
6
- "1": "actionable_exploit_signal"
7
- },
8
- "sources": [
9
- "hacker_exploits",
10
- "cve_hacker_forum",
11
- "hackforums",
12
- "hackerone",
13
- "dtl_exploits",
14
- "exploitdb_hf",
15
- "gayanku",
16
- "evolution",
17
- "hackersploit",
18
- "hackthebox",
19
- "0x00sec",
20
- "kaeli_hacker"
21
- ],
22
- "labeling_rule": "positive examples are Task 4 actionable_exploit records with CVE metadata",
23
- "negative_sampling": "up to two non-actionable messages per actionable message within each temporal split",
24
- "corpus_source": "nvd",
25
- "corpus_size": 340536,
26
- "unique_actionable_cves": 420,
27
- "split_boundaries": {
28
- "train_end": "2022-01-01",
29
- "val_end": "2024-01-01"
30
- },
31
- "metrics": [
32
- "f1_actionable",
33
- "recall_at_1",
34
- "recall_at_5",
35
- "recall_at_10",
36
- "mrr",
37
- "joint_recall_at_5"
38
- ],
39
- "splits": {
40
- "train": 1146,
41
- "val": 438,
42
- "test": 111
43
- },
44
- "label_distribution_by_split": {
45
- "train": {
46
- "0": 764,
47
- "1": 382
48
- },
49
- "val": {
50
- "0": 292,
51
- "1": 146
52
- },
53
- "test": {
54
- "0": 74,
55
- "1": 37
56
- }
57
- },
58
- "source_distribution_by_split": {
59
- "train": {
60
- "cve_hacker_forum": 2,
61
- "dtl_exploits": 267,
62
- "evolution": 37,
63
- "exploitdb_hf": 13,
64
- "gayanku": 296,
65
- "hacker_exploits": 162,
66
- "hackerone": 328,
67
- "hackforums": 12,
68
- "hackthebox": 1,
69
- "kaeli_hacker": 28
70
- },
71
- "val": {
72
- "hacker_exploits": 10,
73
- "hackerone": 358,
74
- "hackersploit": 15,
75
- "hackthebox": 55
76
- },
77
- "test": {
78
- "0x00sec": 6,
79
- "hacker_exploits": 74,
80
- "hackerone": 26,
81
- "hackthebox": 5
82
- }
83
- },
84
- "total": 1695
85
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
benchmark/task5_hacker_signal_detection/test.jsonl DELETED
The diff for this file is too large to render. See raw diff
 
benchmark/task5_hacker_signal_detection/train.jsonl DELETED
The diff for this file is too large to render. See raw diff
 
benchmark/task5_hacker_signal_detection/val.jsonl DELETED
The diff for this file is too large to render. See raw diff