Update README.md
Browse files
README.md
CHANGED
@@ -1,199 +1,123 @@
|
|
1 |
---
|
2 |
library_name: transformers
|
3 |
-
tags:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
4 |
---
|
5 |
|
6 |
-
|
7 |
-
|
8 |
-
<!-- Provide a quick summary of what the model is/does. -->
|
9 |
-
|
10 |
|
|
|
|
|
|
|
11 |
|
12 |
## Model Details
|
13 |
|
14 |
-
|
15 |
-
|
16 |
-
|
17 |
-
|
18 |
-
|
19 |
-
|
20 |
-
- **
|
21 |
-
- **Funded by [optional]:** [More Information Needed]
|
22 |
-
- **Shared by [optional]:** [More Information Needed]
|
23 |
-
- **Model type:** [More Information Needed]
|
24 |
-
- **Language(s) (NLP):** [More Information Needed]
|
25 |
-
- **License:** [More Information Needed]
|
26 |
-
- **Finetuned from model [optional]:** [More Information Needed]
|
27 |
-
|
28 |
-
### Model Sources [optional]
|
29 |
-
|
30 |
-
<!-- Provide the basic links for the model. -->
|
31 |
-
|
32 |
-
- **Repository:** [More Information Needed]
|
33 |
-
- **Paper [optional]:** [More Information Needed]
|
34 |
-
- **Demo [optional]:** [More Information Needed]
|
35 |
|
36 |
## Uses
|
37 |
|
38 |
-
<!-- Address questions around how the model is intended to be used, including the foreseeable users of the model and those affected by the model. -->
|
39 |
-
|
40 |
### Direct Use
|
|
|
|
|
|
|
|
|
41 |
|
42 |
-
|
43 |
-
|
44 |
-
[More Information Needed]
|
45 |
-
|
46 |
-
### Downstream Use [optional]
|
47 |
-
|
48 |
-
<!-- This section is for the model use when fine-tuned for a task, or when plugged into a larger ecosystem/app -->
|
49 |
-
|
50 |
-
[More Information Needed]
|
51 |
|
52 |
### Out-of-Scope Use
|
53 |
-
|
54 |
-
|
55 |
-
|
56 |
-
[More Information Needed]
|
57 |
|
58 |
## Bias, Risks, and Limitations
|
|
|
|
|
|
|
59 |
|
60 |
-
|
|
|
61 |
|
62 |
-
|
|
|
63 |
|
64 |
-
|
|
|
|
|
65 |
|
66 |
-
|
|
|
|
|
67 |
|
68 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
69 |
|
70 |
-
|
|
|
71 |
|
72 |
-
|
|
|
|
|
|
|
|
|
73 |
|
74 |
-
|
|
|
|
|
75 |
|
76 |
## Training Details
|
77 |
|
78 |
### Training Data
|
79 |
-
|
80 |
-
|
81 |
-
|
82 |
-
[More Information Needed]
|
83 |
|
84 |
### Training Procedure
|
85 |
-
|
86 |
-
|
87 |
-
|
88 |
-
|
89 |
-
|
90 |
-
|
91 |
-
|
92 |
-
|
93 |
-
|
94 |
-
|
95 |
-
|
96 |
-
|
97 |
-
|
98 |
-
|
99 |
-
|
100 |
-
|
101 |
-
[More Information Needed]
|
102 |
-
|
103 |
-
## Evaluation
|
104 |
-
|
105 |
-
<!-- This section describes the evaluation protocols and provides the results. -->
|
106 |
-
|
107 |
-
### Testing Data, Factors & Metrics
|
108 |
-
|
109 |
-
#### Testing Data
|
110 |
-
|
111 |
-
<!-- This should link to a Dataset Card if possible. -->
|
112 |
-
|
113 |
-
[More Information Needed]
|
114 |
-
|
115 |
-
#### Factors
|
116 |
-
|
117 |
-
<!-- These are the things the evaluation is disaggregating by, e.g., subpopulations or domains. -->
|
118 |
-
|
119 |
-
[More Information Needed]
|
120 |
-
|
121 |
-
#### Metrics
|
122 |
-
|
123 |
-
<!-- These are the evaluation metrics being used, ideally with a description of why. -->
|
124 |
-
|
125 |
-
[More Information Needed]
|
126 |
-
|
127 |
-
### Results
|
128 |
-
|
129 |
-
[More Information Needed]
|
130 |
-
|
131 |
-
#### Summary
|
132 |
-
|
133 |
-
|
134 |
-
|
135 |
-
## Model Examination [optional]
|
136 |
-
|
137 |
-
<!-- Relevant interpretability work for the model goes here -->
|
138 |
-
|
139 |
-
[More Information Needed]
|
140 |
|
141 |
## Environmental Impact
|
142 |
|
143 |
-
|
144 |
-
|
145 |
-
|
146 |
-
|
147 |
-
- **Hardware Type:** [More Information Needed]
|
148 |
-
- **Hours used:** [More Information Needed]
|
149 |
-
- **Cloud Provider:** [More Information Needed]
|
150 |
-
- **Compute Region:** [More Information Needed]
|
151 |
-
- **Carbon Emitted:** [More Information Needed]
|
152 |
-
|
153 |
-
## Technical Specifications [optional]
|
154 |
-
|
155 |
-
### Model Architecture and Objective
|
156 |
-
|
157 |
-
[More Information Needed]
|
158 |
-
|
159 |
-
### Compute Infrastructure
|
160 |
-
|
161 |
-
[More Information Needed]
|
162 |
-
|
163 |
-
#### Hardware
|
164 |
-
|
165 |
-
[More Information Needed]
|
166 |
-
|
167 |
-
#### Software
|
168 |
-
|
169 |
-
[More Information Needed]
|
170 |
-
|
171 |
-
## Citation [optional]
|
172 |
-
|
173 |
-
<!-- If there is a paper or blog post introducing the model, the APA and Bibtex information for that should go in this section. -->
|
174 |
-
|
175 |
-
**BibTeX:**
|
176 |
-
|
177 |
-
[More Information Needed]
|
178 |
-
|
179 |
-
**APA:**
|
180 |
-
|
181 |
-
[More Information Needed]
|
182 |
-
|
183 |
-
## Glossary [optional]
|
184 |
-
|
185 |
-
<!-- If relevant, include terms and calculations in this section that can help readers understand the model or model card. -->
|
186 |
-
|
187 |
-
[More Information Needed]
|
188 |
-
|
189 |
-
## More Information [optional]
|
190 |
-
|
191 |
-
[More Information Needed]
|
192 |
-
|
193 |
-
## Model Card Authors [optional]
|
194 |
-
|
195 |
-
[More Information Needed]
|
196 |
-
|
197 |
-
## Model Card Contact
|
198 |
-
|
199 |
-
[More Information Needed]
|
|
|
1 |
---
|
2 |
library_name: transformers
|
3 |
+
tags:
|
4 |
+
- Code
|
5 |
+
- Vulnerability
|
6 |
+
- Detection
|
7 |
+
datasets:
|
8 |
+
- DetectVul/devign
|
9 |
+
language:
|
10 |
+
- en
|
11 |
+
base_model:
|
12 |
+
- microsoft/graphcodebert-base
|
13 |
+
license: mit
|
14 |
+
metrics:
|
15 |
+
- accuracy
|
16 |
+
- precision
|
17 |
+
- f1
|
18 |
+
- recall
|
19 |
---
|
20 |
|
21 |
+
## GraphCodeBERT for Code Vulnerability Detection
|
|
|
|
|
|
|
22 |
|
23 |
+
## Model Summary
|
24 |
+
This model is a fine-tuned version of **microsoft/graphcodebert-base**, optimized for detecting vulnerabilities in code. It is trained on the **DetectVul/devign** dataset.
|
25 |
+
The model takes in a code snippet and classifies it as either **safe (0)** or **vulnerable (1)**.
|
26 |
|
27 |
## Model Details
|
28 |
|
29 |
+
- **Developed by:** Mukit Mahdin
|
30 |
+
- **Finetuned from:** `microsoft/graphcodebert-base`
|
31 |
+
- **Language(s):** English (for code comments & metadata), C/C++
|
32 |
+
- **License:** MIT
|
33 |
+
- **Task:** Code vulnerability detection
|
34 |
+
- **Dataset Used:** `DetectVul/devign`
|
35 |
+
- **Architecture:** Transformer-based sequence classification
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
36 |
|
37 |
## Uses
|
38 |
|
|
|
|
|
39 |
### Direct Use
|
40 |
+
This model can be used for **static code analysis**, security audits, and automatic vulnerability detection in software repositories. It is useful for:
|
41 |
+
- **Developers**: To analyze their code for potential security flaws.
|
42 |
+
- **Security Teams**: To scan repositories for known vulnerabilities.
|
43 |
+
- **Researchers**: To study vulnerability detection in AI-powered systems.
|
44 |
|
45 |
+
### Downstream Use
|
46 |
+
This model can be integrated into **IDE plugins**, **CI/CD pipelines**, or **security scanners** to provide real-time vulnerability detection.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47 |
|
48 |
### Out-of-Scope Use
|
49 |
+
- The model is **not meant to replace human security experts**.
|
50 |
+
- It may not generalize well to **languages other than C/C++**.
|
51 |
+
- False positives/negatives may occur due to dataset limitations.
|
|
|
52 |
|
53 |
## Bias, Risks, and Limitations
|
54 |
+
- **False Positives & False Negatives:** The model may flag safe code as vulnerable or miss actual vulnerabilities.
|
55 |
+
- **Limited to C/C++:** The model was trained on a dataset primarily composed of **C and C++ code**. It may not perform well on other languages.
|
56 |
+
- **Dataset Bias:** The training data may not cover all possible vulnerabilities.
|
57 |
|
58 |
+
### Recommendations
|
59 |
+
Users should **not rely solely on the model** for security assessments. Instead, it should be used alongside **manual code review and static analysis tools**.
|
60 |
|
61 |
+
## How to Get Started with the Model
|
62 |
+
Use the code below to load the model and run inference on a sample code snippet:
|
63 |
|
64 |
+
```python
|
65 |
+
from transformers import AutoTokenizer, AutoModelForSequenceClassification
|
66 |
+
import torch
|
67 |
|
68 |
+
# Load the fine-tuned model
|
69 |
+
tokenizer = AutoTokenizer.from_pretrained("microsoft/graphcodebert-base")
|
70 |
+
model = AutoModelForSequenceClassification.from_pretrained("mahdin70/graphcodebert-devign-code-vulnerability-detector")
|
71 |
|
72 |
+
# Sample code snippet
|
73 |
+
code_snippet = '''
|
74 |
+
void process(char *input) {
|
75 |
+
char buffer[50];
|
76 |
+
strcpy(buffer, input); // Potential buffer overflow
|
77 |
+
}
|
78 |
+
'''
|
79 |
|
80 |
+
# Tokenize the input
|
81 |
+
inputs = tokenizer(code_snippet, return_tensors="pt", truncation=True, padding="max_length", max_length=512)
|
82 |
|
83 |
+
# Run inference
|
84 |
+
with torch.no_grad():
|
85 |
+
outputs = model(**inputs)
|
86 |
+
predictions = torch.nn.functional.softmax(outputs.logits, dim=-1)
|
87 |
+
predicted_label = torch.argmax(predictions, dim=1).item()
|
88 |
|
89 |
+
# Output the result
|
90 |
+
print("Vulnerable Code" if predicted_label == 1 else "Safe Code")
|
91 |
+
```
|
92 |
|
93 |
## Training Details
|
94 |
|
95 |
### Training Data
|
96 |
+
- **Dataset:** `DetectVul/devign`
|
97 |
+
- **Classes:** `0 (Safe)`, `1 (Vulnerable)`
|
98 |
+
- **Size:** `21800` Code Snippets
|
|
|
99 |
|
100 |
### Training Procedure
|
101 |
+
- **Optimizer:** AdamW
|
102 |
+
- **Loss Function:** CrossEntropyLoss
|
103 |
+
- **Batch Size:** 16
|
104 |
+
- **Learning Rate:** 2e-05
|
105 |
+
- **Epochs:** 3
|
106 |
+
- **Hardware Used:** 2x T4 GPU
|
107 |
+
|
108 |
+
### Metrics
|
109 |
+
| Metric | Score |
|
110 |
+
|------------|-------------|
|
111 |
+
| **Train Loss** | 0.6112 |
|
112 |
+
| **Evaluation Loss** | 0.605983 |
|
113 |
+
| **Accuracy** | 64.27% |
|
114 |
+
| **F1 Score** | 51.8% |
|
115 |
+
| **Precision** | 68.04% |
|
116 |
+
| **Recall** | 41.9% |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
117 |
|
118 |
## Environmental Impact
|
119 |
|
120 |
+
| Factor | Value |
|
121 |
+
|-----------|----------|
|
122 |
+
| **GPU Used** | 2x T4 GPU |
|
123 |
+
| **Training Time** | ~1 hour |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|