Mohammed Sbaihi
commited on
Update README.md
Browse files
README.md
CHANGED
|
@@ -1,63 +1,63 @@
|
|
| 1 |
---
|
| 2 |
library_name: transformers
|
| 3 |
-
tags:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 4 |
---
|
| 5 |
|
| 6 |
# Model Card for Model ID
|
| 7 |
|
| 8 |
-
|
| 9 |
-
|
| 10 |
-
|
| 11 |
|
| 12 |
## Model Details
|
| 13 |
|
| 14 |
### Model Description
|
| 15 |
|
| 16 |
-
|
| 17 |
-
|
| 18 |
-
|
| 19 |
-
|
| 20 |
-
-
|
| 21 |
-
-
|
| 22 |
-
-
|
| 23 |
-
-
|
| 24 |
-
-
|
| 25 |
-
|
| 26 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 27 |
|
| 28 |
### Model Sources [optional]
|
| 29 |
|
| 30 |
-
<!-- Provide the basic links for the model. -->
|
| 31 |
|
| 32 |
-
- **Repository:** [
|
| 33 |
-
- **
|
| 34 |
-
- **Demo [optional]:** [More Information Needed]
|
| 35 |
|
| 36 |
## Uses
|
| 37 |
|
| 38 |
-
|
| 39 |
-
|
| 40 |
-
### Direct Use
|
| 41 |
-
|
| 42 |
-
<!-- This section is for the model use without fine-tuning or plugging into a larger ecosystem/app. -->
|
| 43 |
-
|
| 44 |
-
[More Information Needed]
|
| 45 |
-
|
| 46 |
-
### Downstream Use [optional]
|
| 47 |
|
| 48 |
-
<!-- This section is for the model use when fine-tuned for a task, or when plugged into a larger ecosystem/app -->
|
| 49 |
-
|
| 50 |
-
[More Information Needed]
|
| 51 |
|
| 52 |
-
### Out-of-Scope Use
|
| 53 |
-
|
| 54 |
-
<!-- This section addresses misuse, malicious use, and uses that the model will not work well for. -->
|
| 55 |
-
|
| 56 |
-
[More Information Needed]
|
| 57 |
|
| 58 |
## Bias, Risks, and Limitations
|
| 59 |
|
| 60 |
-
<!-- This section is meant to convey both technical and sociotechnical limitations. -->
|
| 61 |
|
| 62 |
[More Information Needed]
|
| 63 |
|
|
|
|
| 1 |
---
|
| 2 |
library_name: transformers
|
| 3 |
+
tags:
|
| 4 |
+
- code
|
| 5 |
+
- cybersecurity
|
| 6 |
+
- vulnerability
|
| 7 |
+
- cpp
|
| 8 |
+
license: apache-2.0
|
| 9 |
+
datasets:
|
| 10 |
+
- lemon42-ai/minified-diverseful-multilabels
|
| 11 |
+
metrics:
|
| 12 |
+
- accuracy
|
| 13 |
+
base_model:
|
| 14 |
+
- answerdotai/ModernBERT-base
|
| 15 |
+
pipeline_tag: text-classification
|
| 16 |
---
|
| 17 |
|
| 18 |
# Model Card for Model ID
|
| 19 |
|
| 20 |
+
This is derivative version of [answerdotai/ModernBERT-base](https://huggingface.co/answerdotai/ModernBERT-base). <br>
|
| 21 |
+
We fine-tuned ModernBERT-base to detect vulnerability in C/C++ Code. <br>
|
| 22 |
+
The actual version has an accuracy of 82% <br>
|
| 23 |
|
| 24 |
## Model Details
|
| 25 |
|
| 26 |
### Model Description
|
| 27 |
|
| 28 |
+
ThreatDetect-C-Cpp can be used as a code classifier. It classify the input code into 7 labels: 'safe' (no vulnerability detected) and six other CWE weaknesses:
|
| 29 |
+
| Label | Description |
|
| 30 |
+
|---------|-------------------------------------------------------|
|
| 31 |
+
| CWE-119 | Improper Restriction of Operations within the Bounds of a Memory Buffer |
|
| 32 |
+
| CWE-125 | Out-of-bounds Read |
|
| 33 |
+
| CWE-20 | Improper Input Validation |
|
| 34 |
+
| CWE-416 | Use After Free |
|
| 35 |
+
| CWE-703 | Improper Check or Handling of Exceptional Conditions |
|
| 36 |
+
| CWE-787 | Out-of-bounds Write |
|
| 37 |
+
| safe | Safe code |
|
| 38 |
+
|
| 39 |
+
|
| 40 |
+
- **Developed by:** [lemon42-ai](https://github.com/lemon42-ai)
|
| 41 |
+
- **Contributers** [Abdellah Oumida](https://www.linkedin.com/in/abdellah-oumida-ab9082234/) & [Mohamed Sbaihi](https://www.linkedin.com/in/mohammed-sbaihi-aa6493254/)
|
| 42 |
+
- **Model type:** [ModernBERT, Encoder-only Transformer](https://arxiv.org/abs/2412.13663)
|
| 43 |
+
- **Supported Programming Languages:** C/C++
|
| 44 |
+
- **License:** Apache 2.0 (see original License of ModernBERT-Base)
|
| 45 |
+
- **Finetuned from model:** [answerdotai/ModernBERT-base](https://huggingface.co/answerdotai/ModernBERT-base).
|
| 46 |
|
| 47 |
### Model Sources [optional]
|
| 48 |
|
|
|
|
| 49 |
|
| 50 |
+
- **Repository:** [The official lemon42-ai Github repository](https://github.com/lemon42-ai/ThreatDetect-code-vulnerability-detection)
|
| 51 |
+
- **Technical Blog Post:** Coming soon.
|
|
|
|
| 52 |
|
| 53 |
## Uses
|
| 54 |
|
| 55 |
+
ThreadDetect-C-Cpp can be integrated in code-related applications. For example, it can be used in pair with a code generator to detect vulnerabilities in the generated code.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 56 |
|
|
|
|
|
|
|
|
|
|
| 57 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 58 |
|
| 59 |
## Bias, Risks, and Limitations
|
| 60 |
|
|
|
|
| 61 |
|
| 62 |
[More Information Needed]
|
| 63 |
|