DatasetSubmission commited on
Commit
dac8248
·
verified ·
1 Parent(s): e363945

Update Croissant metadata to 3-task benchmark_v2 structure

Browse files
Files changed (1) hide show
  1. etg_croissant.json +33 -158
etg_croissant.json CHANGED
@@ -11,7 +11,7 @@
11
  "@type": "sc:Dataset",
12
  "dct:conformsTo": "http://mlcommons.org/croissant/RAI/1.0",
13
  "name": "HackerSignal",
14
- "description": "HackerSignal is a large-scale, multi-source dataset linking hacker community discourse, exploit databases, vulnerability advisories, and fix commits through a shared CVE identifier space. It spans 64 public forum/source identifiers across eight source layers, covers 1988\u20132026, and supports five benchmark tasks: exploit relevance classification, CVE linkage retrieval, leakage-sanitized severity prediction, hacker exploit labeling, and hacker exploit signal detection.",
15
  "url": "https://huggingface.co/datasets/DatasetSubmission/HackerSignal",
16
  "version": "1.0.0",
17
  "license": "https://creativecommons.org/licenses/by/4.0/",
@@ -23,11 +23,13 @@
23
  "zh",
24
  "ru"
25
  ],
26
- "citation": "Anonymous (2026). HackerSignal \u2014 A Multi-Source Dataset for Hacker Community Analysis and CVE Linkage. Submitted to NeurIPS Evaluations & Datasets Track.",
27
  "creator": [
28
  {
29
  "@type": "sc:Person",
30
- "name": "Anonymous"
 
 
31
  }
32
  ],
33
  "keywords": [
@@ -89,7 +91,7 @@
89
  "prov:wasGeneratedBy": {
90
  "@type": "prov:Activity",
91
  "name": "HackerSignal ETL Pipeline",
92
- "description": "Collection scripts executed by the dataset authors between January and April 2026 using public APIs, public dataset ingestion, web scraping of publicly accessible pages, and pre-processed dataset imports. The pipeline performs HTML stripping, encoding normalization, text truncation (8000 chars), exact deduplication by SHA-256 fingerprint, author pseudonymization, and source-layer normalization.",
93
  "prov:startedAtTime": "2026-01-01",
94
  "prov:endedAtTime": "2026-04-30"
95
  },
@@ -108,7 +110,7 @@
108
  "rai:personalSensitiveInformation": "No private communications, medical records, financial records, or government classified information is intentionally included. All text was collected from publicly accessible sources. Author strings are pseudonymized via SHA-256 hashing of source-namespaced author identifiers; original author strings are not recoverable from the released dataset. Public forum usernames are not distributed. The release supports takedown and correction requests through the repository issue tracker.",
109
  "rai:dataUseCases": "Intended uses: defensive cybersecurity research, temporal retrieval, provenance-aware benchmark design, vulnerability lifecycle analysis, exploit prediction and early warning systems, cross-lingual threat intelligence, graph neural network research on exploit\u2013CVE\u2013fix commit knowledge graphs, and pre-training domain-adapted language models for cybersecurity. Prohibited uses: training systems for automated exploit code generation or malware; de-anonymizing forum participants or linking pseudonymous identities outside approved research protocols; operational blocking, law-enforcement, or employment decisions based solely on model outputs; republishing source text from metadata_or_pointer_only sources.",
110
  "rai:dataSocialImpact": "HackerSignal enables earlier detection of vulnerability exploitation activity by connecting hacker community discourse to the CVE lifecycle. Positive impacts include faster defensive response times and better understanding of exploit emergence patterns. Potential negative impacts include misuse for automated attack generation or targeting of individuals; these are mitigated through responsible-use restrictions, author pseudonymization, source-level release governance, and explicit prohibition of offensive applications in the dataset license.",
111
- "rai:dataReleaseMaintenancePlan": "Maintained by the dataset maintainer (contact via repository issue tracker). Annual updates planned to incorporate new CVE records, CISA KEV entries, and newly published advisories. Versioning follows semantic versioning (MAJOR.MINOR.PATCH). All tagged versions remain available on HuggingFace Hub. Takedown and correction requests acknowledged within 10 business days; disputed text removed in next patch release. Sources that change terms post-release are downgraded to metadata_or_pointer_only until permissions are clarified.",
112
  "rai:hasSyntheticData": "none",
113
  "distribution": [
114
  {
@@ -281,9 +283,9 @@
281
  },
282
  {
283
  "@type": "cr:RecordSet",
284
- "@id": "task1_exploit_clf",
285
- "name": "task1_exploit_clf",
286
- "description": "Task 1 \u2014 Exploit Relevance Classification. Binary classification: label=1 if exploit-relevant, label=0 otherwise. Temporal split: train (pre-2022), val (2022\u20132023), test (2024+). Balanced within source/split cells to remove source-membership confounding.",
287
  "field": [
288
  {
289
  "@type": "cr:Field",
@@ -299,10 +301,10 @@
299
  },
300
  {
301
  "@type": "cr:Field",
302
- "@id": "task1/label",
303
- "name": "label",
304
- "dataType": "sc:Integer",
305
- "description": "0 = not exploit-relevant, 1 = exploit-relevant"
306
  },
307
  {
308
  "@type": "cr:Field",
@@ -327,9 +329,9 @@
327
  },
328
  {
329
  "@type": "cr:RecordSet",
330
- "@id": "task2_cve_linkage",
331
- "name": "task2_cve_linkage",
332
- "description": "Task 2 \u2014 Quality-Controlled CVE Linkage Retrieval. Given source evidence text, retrieve the metadata-linked NVD CVE entry from a corpus of ~340K CVE descriptions. Quality-controlled to remove unretrievable empty/high-risk rows. Evaluated as a ranking problem (Recall@K, MRR).",
333
  "field": [
334
  {
335
  "@type": "cr:Field",
@@ -343,11 +345,19 @@
343
  "name": "text",
344
  "dataType": "sc:Text"
345
  },
 
 
 
 
 
 
 
346
  {
347
  "@type": "cr:Field",
348
  "@id": "task2/cve_id",
349
  "name": "cve_id",
350
- "dataType": "sc:Text"
 
351
  },
352
  {
353
  "@type": "cr:Field",
@@ -372,9 +382,9 @@
372
  },
373
  {
374
  "@type": "cr:RecordSet",
375
- "@id": "task3_severity",
376
- "name": "task3_severity",
377
- "description": "Task 3 \u2014 Severity Prediction. 4-class classification: predict CVSS severity bucket (0=low, 1=medium, 2=high, 3=critical) from advisory text. Explicit severity/CVSS strings are stripped from model input after label extraction. Automated leakage audit finds zero strict sanitized hits.",
378
  "field": [
379
  {
380
  "@type": "cr:Field",
@@ -386,29 +396,14 @@
386
  "@type": "cr:Field",
387
  "@id": "task3/text",
388
  "name": "text",
389
- "dataType": "sc:Text",
390
- "description": "Advisory text after severity/CVSS leakage strings have been stripped."
391
- },
392
- {
393
- "@type": "cr:Field",
394
- "@id": "task3/text_raw",
395
- "name": "text_raw",
396
- "dataType": "sc:Text",
397
- "description": "Original text before explicit severity/CVSS leakage strings were stripped."
398
  },
399
  {
400
  "@type": "cr:Field",
401
- "@id": "task3/severity",
402
- "name": "severity",
403
  "dataType": "sc:Text",
404
- "description": "Severity label string: low / medium / high / critical"
405
- },
406
- {
407
- "@type": "cr:Field",
408
- "@id": "task3/severity_label",
409
- "name": "severity_label",
410
- "dataType": "sc:Integer",
411
- "description": "Severity as integer: 0=low, 1=medium, 2=high, 3=critical"
412
  },
413
  {
414
  "@type": "cr:Field",
@@ -430,126 +425,6 @@
430
  "description": "train / val / test"
431
  }
432
  ]
433
- },
434
- {
435
- "@type": "cr:RecordSet",
436
- "@id": "task4_hacker_exploit_labeling",
437
- "name": "task4_hacker_exploit_labeling",
438
- "description": "Task 4 \u2014 Hacker Exploit Labeling. Ternary weak-supervision task over hacker-community messages: 0=non-exploit/noise, 1=vulnerability discussion, 2=actionable exploit intelligence. Labels derived from CVE metadata and actionability cues.",
439
- "field": [
440
- {
441
- "@type": "cr:Field",
442
- "@id": "task4/id",
443
- "name": "id",
444
- "dataType": "sc:Text"
445
- },
446
- {
447
- "@type": "cr:Field",
448
- "@id": "task4/text",
449
- "name": "text",
450
- "dataType": "sc:Text"
451
- },
452
- {
453
- "@type": "cr:Field",
454
- "@id": "task4/label",
455
- "name": "label",
456
- "dataType": "sc:Integer",
457
- "description": "0=non_exploit_noise, 1=vulnerability_discussion, 2=actionable_exploit"
458
- },
459
- {
460
- "@type": "cr:Field",
461
- "@id": "task4/label_name",
462
- "name": "label_name",
463
- "dataType": "sc:Text",
464
- "description": "Human-readable label: non_exploit_noise, vulnerability_discussion, or actionable_exploit"
465
- },
466
- {
467
- "@type": "cr:Field",
468
- "@id": "task4/cve_ids",
469
- "name": "cve_ids",
470
- "dataType": "sc:Text",
471
- "description": "Comma-separated CVE identifiers when applicable."
472
- },
473
- {
474
- "@type": "cr:Field",
475
- "@id": "task4/source",
476
- "name": "source",
477
- "dataType": "sc:Text"
478
- },
479
- {
480
- "@type": "cr:Field",
481
- "@id": "task4/timestamp",
482
- "name": "timestamp",
483
- "dataType": "sc:DateTime"
484
- },
485
- {
486
- "@type": "cr:Field",
487
- "@id": "task4/split",
488
- "name": "split",
489
- "dataType": "sc:Text",
490
- "description": "train / val / test"
491
- }
492
- ]
493
- },
494
- {
495
- "@type": "cr:RecordSet",
496
- "@id": "task5_hacker_signal_detection",
497
- "name": "task5_hacker_signal_detection",
498
- "description": "Task 5 \u2014 Hacker Exploit Signal Detection. Joint task: detect actionable exploit intelligence in hacker-community messages and retrieve the associated NVD CVE context when applicable. Positives are Task 4 actionable records with CVE metadata.",
499
- "field": [
500
- {
501
- "@type": "cr:Field",
502
- "@id": "task5/id",
503
- "name": "id",
504
- "dataType": "sc:Text"
505
- },
506
- {
507
- "@type": "cr:Field",
508
- "@id": "task5/text",
509
- "name": "text",
510
- "dataType": "sc:Text"
511
- },
512
- {
513
- "@type": "cr:Field",
514
- "@id": "task5/actionable_label",
515
- "name": "actionable_label",
516
- "dataType": "sc:Integer",
517
- "description": "0=not_actionable_exploit_signal, 1=actionable_exploit_signal"
518
- },
519
- {
520
- "@type": "cr:Field",
521
- "@id": "task5/cve_id",
522
- "name": "cve_id",
523
- "dataType": "sc:Text",
524
- "description": "Primary CVE target for actionable records; empty for non-actionable records."
525
- },
526
- {
527
- "@type": "cr:Field",
528
- "@id": "task5/cve_ids",
529
- "name": "cve_ids",
530
- "dataType": "sc:Text",
531
- "description": "Comma-separated CVE identifiers when applicable."
532
- },
533
- {
534
- "@type": "cr:Field",
535
- "@id": "task5/source",
536
- "name": "source",
537
- "dataType": "sc:Text"
538
- },
539
- {
540
- "@type": "cr:Field",
541
- "@id": "task5/timestamp",
542
- "name": "timestamp",
543
- "dataType": "sc:DateTime"
544
- },
545
- {
546
- "@type": "cr:Field",
547
- "@id": "task5/split",
548
- "name": "split",
549
- "dataType": "sc:Text",
550
- "description": "train / val / test"
551
- }
552
- ]
553
  }
554
  ]
555
  }
 
11
  "@type": "sc:Dataset",
12
  "dct:conformsTo": "http://mlcommons.org/croissant/RAI/1.0",
13
  "name": "HackerSignal",
14
+ "description": "HackerSignal is a large-scale, multi-source dataset linking hacker community discourse, exploit databases, vulnerability advisories, and fix commits through a shared CVE identifier space. It spans 64 public forum/source identifiers across eight source layers, covers 1988\u20132026, and supports three benchmark tasks: CVE linkage retrieval, hacker signal detection with CVE grounding, and CVE-disjoint temporal generalization.",
15
  "url": "https://huggingface.co/datasets/DatasetSubmission/HackerSignal",
16
  "version": "1.0.0",
17
  "license": "https://creativecommons.org/licenses/by/4.0/",
 
23
  "zh",
24
  "ru"
25
  ],
26
+ "citation": "Ampel, B. (2026). HackerSignal \u2014 A Multi-Source Dataset for Hacker Community Analysis and CVE Linkage. Proceedings of NeurIPS Evaluations & Datasets Track.",
27
  "creator": [
28
  {
29
  "@type": "sc:Person",
30
+ "name": "Benjamin Ampel",
31
+ "email": "ben.ampel@gmail.com",
32
+ "affiliation": "University of Arizona"
33
  }
34
  ],
35
  "keywords": [
 
91
  "prov:wasGeneratedBy": {
92
  "@type": "prov:Activity",
93
  "name": "HackerSignal ETL Pipeline",
94
+ "description": "Collection scripts executed by Benjamin Ampel between January and April 2026 using public APIs, public dataset ingestion, web scraping of publicly accessible pages, and pre-processed dataset imports. The pipeline performs HTML stripping, encoding normalization, text truncation (8000 chars), exact deduplication by SHA-256 fingerprint, author pseudonymization, and source-layer normalization.",
95
  "prov:startedAtTime": "2026-01-01",
96
  "prov:endedAtTime": "2026-04-30"
97
  },
 
110
  "rai:personalSensitiveInformation": "No private communications, medical records, financial records, or government classified information is intentionally included. All text was collected from publicly accessible sources. Author strings are pseudonymized via SHA-256 hashing of source-namespaced author identifiers; original author strings are not recoverable from the released dataset. Public forum usernames are not distributed. The release supports takedown and correction requests through the repository issue tracker.",
111
  "rai:dataUseCases": "Intended uses: defensive cybersecurity research, temporal retrieval, provenance-aware benchmark design, vulnerability lifecycle analysis, exploit prediction and early warning systems, cross-lingual threat intelligence, graph neural network research on exploit\u2013CVE\u2013fix commit knowledge graphs, and pre-training domain-adapted language models for cybersecurity. Prohibited uses: training systems for automated exploit code generation or malware; de-anonymizing forum participants or linking pseudonymous identities outside approved research protocols; operational blocking, law-enforcement, or employment decisions based solely on model outputs; republishing source text from metadata_or_pointer_only sources.",
112
  "rai:dataSocialImpact": "HackerSignal enables earlier detection of vulnerability exploitation activity by connecting hacker community discourse to the CVE lifecycle. Positive impacts include faster defensive response times and better understanding of exploit emergence patterns. Potential negative impacts include misuse for automated attack generation or targeting of individuals; these are mitigated through responsible-use restrictions, author pseudonymization, source-level release governance, and explicit prohibition of offensive applications in the dataset license.",
113
+ "rai:dataReleaseMaintenancePlan": "Maintained by Benjamin Ampel (ben.ampel@gmail.com). Annual updates planned to incorporate new CVE records, CISA KEV entries, and newly published advisories. Versioning follows semantic versioning (MAJOR.MINOR.PATCH). All tagged versions remain available on HuggingFace Hub. Takedown and correction requests acknowledged within 10 business days; disputed text removed in next patch release. Sources that change terms post-release are downgraded to metadata_or_pointer_only until permissions are clarified.",
114
  "rai:hasSyntheticData": "none",
115
  "distribution": [
116
  {
 
283
  },
284
  {
285
  "@type": "cr:RecordSet",
286
+ "@id": "task1_cve_linkage",
287
+ "name": "task1_cve_linkage",
288
+ "description": "Task 1 \u2014 CVE Linkage Retrieval (CVE-R). Cross-source temporally OOD entity grounding: given exploit/advisory evidence text, retrieve the correct NVD CVE entry from a corpus of 340,536 descriptions. Quality-controlled to remove unretrievable rows. 40,698 train / 2,551 val / 550 test.",
289
  "field": [
290
  {
291
  "@type": "cr:Field",
 
301
  },
302
  {
303
  "@type": "cr:Field",
304
+ "@id": "task1/cve_id",
305
+ "name": "cve_id",
306
+ "dataType": "sc:Text",
307
+ "description": "Target CVE identifier in the corpus."
308
  },
309
  {
310
  "@type": "cr:Field",
 
329
  },
330
  {
331
  "@type": "cr:RecordSet",
332
+ "@id": "task2_signal_detection",
333
+ "name": "task2_signal_detection",
334
+ "description": "Task 2 \u2014 Hacker Signal Detection (HSD). Two-stage: detect actionable exploit signals from hacker community noise (10:1 negative ratio), then ground positives to NVD CVE. 4,202 train / 1,606 val / 407 test.",
335
  "field": [
336
  {
337
  "@type": "cr:Field",
 
345
  "name": "text",
346
  "dataType": "sc:Text"
347
  },
348
+ {
349
+ "@type": "cr:Field",
350
+ "@id": "task2/actionable_label",
351
+ "name": "actionable_label",
352
+ "dataType": "sc:Integer",
353
+ "description": "0=not_actionable, 1=actionable_exploit_signal"
354
+ },
355
  {
356
  "@type": "cr:Field",
357
  "@id": "task2/cve_id",
358
  "name": "cve_id",
359
+ "dataType": "sc:Text",
360
+ "description": "Primary CVE target for actionable records; empty for non-actionable."
361
  },
362
  {
363
  "@type": "cr:Field",
 
382
  },
383
  {
384
  "@type": "cr:RecordSet",
385
+ "@id": "task3_temporal_generalization",
386
+ "name": "task3_temporal_generalization",
387
+ "description": "Task 3 \u2014 Temporal Generalization (TG). Identical retrieval formulation to Task 1 but with strict CVE-disjoint constraint: C_train \u2229 C_test = \u2205. Split by CVE publication year (train <2022, test 2024+). 41,630 train / 1,776 val / 393 test.",
388
  "field": [
389
  {
390
  "@type": "cr:Field",
 
396
  "@type": "cr:Field",
397
  "@id": "task3/text",
398
  "name": "text",
399
+ "dataType": "sc:Text"
 
 
 
 
 
 
 
 
400
  },
401
  {
402
  "@type": "cr:Field",
403
+ "@id": "task3/cve_id",
404
+ "name": "cve_id",
405
  "dataType": "sc:Text",
406
+ "description": "Target CVE identifier (from 2024+ CVE set, disjoint from training CVEs)."
 
 
 
 
 
 
 
407
  },
408
  {
409
  "@type": "cr:Field",
 
425
  "description": "train / val / test"
426
  }
427
  ]
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
428
  }
429
  ]
430
  }