HackerSignal / README.md
DatasetSubmission's picture
Add explicit features to all configs; fix string-to-null type inference error
c78089d verified
metadata
language:
  - en
  - zh
  - ru
license: cc-by-4.0
size_categories:
  - 1M<n<10M
task_categories:
  - text-classification
  - text-retrieval
tags:
  - cybersecurity
  - exploit
  - vulnerability
  - CVE
  - hacker-forum
  - threat-intelligence
  - NLP
  - benchmark
pretty_name: HackerSignal
dataset_info:
  splits:
    - name: full
      num_examples: 7447646
  features:
    - name: unified_id
      dtype: string
    - name: source_dataset
      dtype: string
    - name: source_file
      dtype: string
    - name: source_format
      dtype: string
    - name: source_layer
      dtype: string
    - name: source_record_id
      dtype: string
    - name: forum_id
      dtype: string
    - name: timestamp
      dtype: string
    - name: author_hash
      dtype: string
    - name: text
      dtype: string
    - name: text_raw
      dtype: string
    - name: text_length
      dtype: int64
    - name: text_raw_length
      dtype: int64
    - name: text_sha256
      dtype: string
    - name: text_raw_sha256
      dtype: string
    - name: thread_url
      dtype: string
    - name: thread_title
      dtype: string
    - name: section
      dtype: string
    - name: post_index
      dtype: int64
    - name: post_id
      dtype: string
    - name: thread_id
      dtype: string
    - name: scraped_at
      dtype: string
    - name: reply_count
      dtype: int64
    - name: view_count
      dtype: int64
    - name: tags
      sequence: string
    - name: cve_refs
      sequence: string
    - name: dataset_generated_at
      dtype: string
    - name: release_mode
      dtype: string
    - name: released_artifact
      dtype: string
    - name: redaction_reason
      dtype: string
configs:
  - config_name: default
    data_files:
      - split: full
        path: unified_hacker_communities_neurips_public.jsonl
    features:
      - name: unified_id
        dtype: string
      - name: source_dataset
        dtype: string
      - name: source_file
        dtype: string
      - name: source_format
        dtype: string
      - name: source_layer
        dtype: string
      - name: source_record_id
        dtype: string
      - name: forum_id
        dtype: string
      - name: timestamp
        dtype: string
      - name: author_hash
        dtype: string
      - name: text
        dtype: string
      - name: text_raw
        dtype: string
      - name: text_length
        dtype: int64
      - name: text_raw_length
        dtype: int64
      - name: text_sha256
        dtype: string
      - name: text_raw_sha256
        dtype: string
      - name: thread_url
        dtype: string
      - name: thread_title
        dtype: string
      - name: section
        dtype: string
      - name: post_index
        dtype: int64
      - name: post_id
        dtype: string
      - name: thread_id
        dtype: string
      - name: scraped_at
        dtype: string
      - name: reply_count
        dtype: int64
      - name: view_count
        dtype: int64
      - name: tags
        sequence: string
      - name: cve_refs
        sequence: string
      - name: dataset_generated_at
        dtype: string
      - name: release_mode
        dtype: string
      - name: released_artifact
        dtype: string
      - name: redaction_reason
        dtype: string
  - config_name: sample
    data_files:
      - split: full
        path: hackersignal_sample_10k.jsonl
    features:
      - name: unified_id
        dtype: string
      - name: source_dataset
        dtype: string
      - name: source_file
        dtype: string
      - name: source_format
        dtype: string
      - name: source_layer
        dtype: string
      - name: source_record_id
        dtype: string
      - name: forum_id
        dtype: string
      - name: timestamp
        dtype: string
      - name: author_hash
        dtype: string
      - name: text
        dtype: string
      - name: text_raw
        dtype: string
      - name: text_length
        dtype: int64
      - name: text_raw_length
        dtype: int64
      - name: text_sha256
        dtype: string
      - name: text_raw_sha256
        dtype: string
      - name: thread_url
        dtype: string
      - name: thread_title
        dtype: string
      - name: section
        dtype: string
      - name: post_index
        dtype: int64
      - name: post_id
        dtype: string
      - name: thread_id
        dtype: string
      - name: scraped_at
        dtype: string
      - name: reply_count
        dtype: int64
      - name: view_count
        dtype: int64
      - name: tags
        sequence: string
      - name: cve_refs
        sequence: string
      - name: dataset_generated_at
        dtype: string
      - name: release_mode
        dtype: string
      - name: released_artifact
        dtype: string
      - name: redaction_reason
        dtype: string
  - config_name: task1_cve_linkage
    data_files:
      - split: train
        path: benchmark_v2/task1_cve_linkage/train.jsonl
      - split: validation
        path: benchmark_v2/task1_cve_linkage/val.jsonl
      - split: test
        path: benchmark_v2/task1_cve_linkage/test.jsonl
      - split: corpus
        path: benchmark_v2/task1_cve_linkage/corpus.jsonl
    features:
      - name: id
        dtype: string
      - name: text
        dtype: string
      - name: cve_id
        dtype: string
      - name: source
        dtype: string
      - name: timestamp
        dtype: string
  - config_name: task2_exploit_type
    data_files:
      - split: train
        path: benchmark_v2/task2_exploit_type/train.jsonl
      - split: validation
        path: benchmark_v2/task2_exploit_type/val.jsonl
      - split: test
        path: benchmark_v2/task2_exploit_type/test.jsonl
    features:
      - name: id
        dtype: string
      - name: text
        dtype: string
      - name: label
        dtype: string
      - name: source
        dtype: string
      - name: timestamp
        dtype: string
  - config_name: task3_temporal_generalization
    data_files:
      - split: train
        path: benchmark_v2/task3_temporal_generalization/train.jsonl
      - split: validation
        path: benchmark_v2/task3_temporal_generalization/val.jsonl
      - split: test
        path: benchmark_v2/task3_temporal_generalization/test.jsonl
      - split: corpus
        path: benchmark_v2/task3_temporal_generalization/corpus.jsonl
    features:
      - name: id
        dtype: string
      - name: text
        dtype: string
      - name: cve_id
        dtype: string
      - name: source
        dtype: string
      - name: timestamp
        dtype: string

HackerSignal

A large-scale, multi-source dataset linking hacker community discourse, exploit databases, vulnerability advisories, and fix commits through a shared CVE identifier space.

Overview

Statistic Value
Documents 7,447,646 (exact-deduplicated)
Sources 64 public forum/source identifiers
Source layers 8
Temporal span 1988--2026
CVE-linked rows 360,004
Benchmark tasks 3

Quick Start

from datasets import load_dataset

# Load the 10K stratified sample (24 MB)
sample = load_dataset("DatasetSubmission/HackerSignal", "sample")

# Load a benchmark task
task1 = load_dataset("DatasetSubmission/HackerSignal", "task1_cve_linkage")

# Load the full corpus (12 GB)
full = load_dataset("DatasetSubmission/HackerSignal", "default")

Source Layers

Layer Description Rows
hacker_community Forum posts from hacker/security communities 6,974,128
exploit_archive Published exploit code and advisories 197,393
vulnerability_reference NVD CVE descriptions and structured advisories 150,916
exploit_qa_reference Security Q&A and tutorial content 68,791
advisory_reference Vendor and third-party security advisories 30,361
bug_bounty_disclosure Public bug bounty reports 13,720
fix_commit_reference Vulnerability fix commit messages 11,104
exploitation_reference Active exploitation indicators (CISA KEV) 1,233

Benchmark Tasks

Task 1: CVE Linkage Retrieval (CVE-R)

Cross-source temporally OOD entity grounding: given exploit/advisory evidence text, retrieve the correct NVD CVE entry from a corpus of 340K descriptions. Queries come from 22 source identifiers across exploit archives, advisories, fix commits, and bug bounty reports; filtered to ≥8 tokens.

Split Rows
Train 56,692
Val 2,584
Test 1,990
Corpus 340,536

Task 2: Exploit Type Classification (ETC)

8-class temporal OOD classification of exploit posts by type: injection, XSS, memory corruption, DoS, file inclusion, authentication/access bypass, RCE, and information disclosure. Sourced from ExploitDB and HackerOne public reports; split by publication year so test posts postdate all training examples.

Split Rows
Train 64,413
Val 4,735
Test 1,735

Task 3: Temporal Generalization (TG)

Identical retrieval formulation to Task 1 but with strict CVE-disjoint constraint: C_train ∩ C_test = ∅. Split by CVE publication year (train: <2022, test: 2024+) to test generalization to wholly unseen vulnerabilities.

Split Rows
Train 56,833
Val 2,535
Test 1,898
Corpus 340,536

Schema

Each record in the main corpus contains:

Field Type Description
unified_id string SHA-256-derived release identifier
source_dataset string Input source file or dataset name
source_layer string Normalized layer (see above)
text string UTF-8 post/advisory text (max 8000 chars)
timestamp string ISO 8601 publication datetime (UTC)
forum_id string Source identifier
author_hash string SHA-256 pseudonymized author
release_mode string Governance mode (see below)

Release Governance

Records follow source-specific release modes:

  • redistributable_text (5 sources): Full text included under public-domain or CC licenses.
  • research_text_with_terms (9 sources): Text included with source attribution; no commercial reuse.
  • metadata_or_pointer_only (13 sources): Only metadata, timestamps, CVE refs, text hashes, and lengths; raw text withheld.

See docs/release_governance.md for the full source matrix, takedown policy, and responsible-use restrictions.

Responsible Use

This dataset is intended for defensive cybersecurity research only. Prohibited uses include:

  • Training systems for automated exploit code generation or malware
  • De-anonymizing forum participants outside approved research protocols
  • Operational blocking or law-enforcement decisions based solely on model outputs
  • Republishing text from metadata_or_pointer_only sources

Known Issues

  • HuggingFace dataset viewer row count: The viewer may display a partial count (~1M) for the default/full split because HF's streaming viewer cannot fully index files over ~10 GB. The actual row count is 7,447,646 as validated against the SHA-256 manifest.
  • Content-scanner warnings: HF's automated scanner flags several files (including the sample JSONL) as "Unsafe" due to exploit and vulnerability text. This is expected for a cybersecurity research dataset and does not indicate malicious content. See the Responsible Use section below.

Limitations

  • English-language bias; non-English communities may be underrepresented
  • Historical forum imports skew toward 2015--2017
  • Task labels are weak (CVE-linkage-derived), not human-annotated
  • ~8% near-duplicate content remains after exact deduplication
  • 1.57M rows under 8 tokens (useful for interaction analysis, not classification)

Citation

@misc{hackersignal2026,
  title={{HackerSignal}: A Temporally Structured, Multi-Source Benchmark for Cybersecurity Threat Intelligence},
  author={Anonymous},
  year={2026},
  howpublished={arXiv preprint}
}

License

Code and metadata: CC BY 4.0. Source text retains source-specific terms documented in the governance addendum and release manifest.