EAV123 commited on
Commit
f94f145
·
verified ·
1 Parent(s): 7937094

Update app.py

Browse files
Files changed (1) hide show
  1. app.py +11 -11
app.py CHANGED
@@ -438,18 +438,18 @@ if st.session_state.analysis_stage >= 2 and st.session_state.ensemble_result is
438
  - No significant red flags were detected in the ensemble
439
  """)
440
 
441
- # Final ensemble verdict
442
- st.markdown("### Ensemble Verdict")
443
- vote_benign = results['vote_count'][0] # Votes for safe
444
- vote_malicious = results['vote_count'][1] # Votes for malicious
445
 
446
- # Decision-making based on votes
447
- if vote_benign > 3: # Safe votes must be greater than 3
448
- st.success("✅ Query deemed safe by majority vote")
449
- elif vote_malicious > 3: # Malicious votes greater than 3
450
- st.error("🚨 SQL Injection Detected by Majority Vote!")
451
- else: # Tie or ambiguous case (e.g., 2 safe, 2 malicious)
452
- st.warning("⚠️ Ambiguous result: The votes are evenly split. Please cross-check the query manually.")
 
 
453
 
454
  # Reset button
455
  if st.button("Analyze Another Query"):
 
438
  - No significant red flags were detected in the ensemble
439
  """)
440
 
441
+ # Final verdict combining both approaches
442
+ st.subheader("Final Analysis")
 
 
443
 
444
+ is_malicious_regex, _ = st.session_state.regex_result
445
+ is_malicious_ensemble = results['ensemble'] == 1
446
+
447
+ if is_malicious_regex or is_malicious_ensemble:
448
+ st.error("⚠️ This query appears to contain SQL injection patterns. Review carefully before executing.")
449
+ else:
450
+ st.success(" This query appears safe based on both rule-based and ensemble detection.")
451
+
452
+ st.info("ℹ️ Remember: Always use parameterized queries and proper input validation in production systems.")
453
 
454
  # Reset button
455
  if st.button("Analyze Another Query"):