language:
- en
- zh
- ru
license: cc-by-4.0
size_categories:
- 1M<n<10M
task_categories:
- text-classification
- text-retrieval
tags:
- cybersecurity
- exploit
- vulnerability
- CVE
- hacker-forum
- threat-intelligence
- NLP
- benchmark
pretty_name: HackerSignal
dataset_info:
splits:
- name: full
num_examples: 7447646
features:
- name: unified_id
dtype: string
- name: source_dataset
dtype: string
- name: source_file
dtype: string
- name: source_format
dtype: string
- name: source_layer
dtype: string
- name: source_record_id
dtype: string
- name: forum_id
dtype: string
- name: timestamp
dtype: string
- name: author_hash
dtype: string
- name: text
dtype: string
- name: text_raw
dtype: string
- name: text_length
dtype: int64
- name: text_raw_length
dtype: int64
- name: text_sha256
dtype: string
- name: text_raw_sha256
dtype: string
- name: thread_url
dtype: string
- name: thread_title
dtype: string
- name: section
dtype: string
- name: post_index
dtype: int64
- name: post_id
dtype: string
- name: thread_id
dtype: string
- name: scraped_at
dtype: string
- name: reply_count
dtype: int64
- name: view_count
dtype: int64
- name: tags
sequence: string
- name: cve_refs
sequence: string
- name: dataset_generated_at
dtype: string
- name: release_mode
dtype: string
- name: released_artifact
dtype: string
- name: redaction_reason
dtype: string
configs:
- config_name: default
data_files:
- split: full
path: unified_hacker_communities_neurips_public.jsonl
features:
- name: unified_id
dtype: string
- name: source_dataset
dtype: string
- name: source_file
dtype: string
- name: source_format
dtype: string
- name: source_layer
dtype: string
- name: source_record_id
dtype: string
- name: forum_id
dtype: string
- name: timestamp
dtype: string
- name: author_hash
dtype: string
- name: text
dtype: string
- name: text_raw
dtype: string
- name: text_length
dtype: int64
- name: text_raw_length
dtype: int64
- name: text_sha256
dtype: string
- name: text_raw_sha256
dtype: string
- name: thread_url
dtype: string
- name: thread_title
dtype: string
- name: section
dtype: string
- name: post_index
dtype: int64
- name: post_id
dtype: string
- name: thread_id
dtype: string
- name: scraped_at
dtype: string
- name: reply_count
dtype: int64
- name: view_count
dtype: int64
- name: tags
sequence: string
- name: cve_refs
sequence: string
- name: dataset_generated_at
dtype: string
- name: release_mode
dtype: string
- name: released_artifact
dtype: string
- name: redaction_reason
dtype: string
- config_name: sample
data_files:
- split: full
path: hackersignal_sample_10k.jsonl
features:
- name: unified_id
dtype: string
- name: source_dataset
dtype: string
- name: source_file
dtype: string
- name: source_format
dtype: string
- name: source_layer
dtype: string
- name: source_record_id
dtype: string
- name: forum_id
dtype: string
- name: timestamp
dtype: string
- name: author_hash
dtype: string
- name: text
dtype: string
- name: text_raw
dtype: string
- name: text_length
dtype: int64
- name: text_raw_length
dtype: int64
- name: text_sha256
dtype: string
- name: text_raw_sha256
dtype: string
- name: thread_url
dtype: string
- name: thread_title
dtype: string
- name: section
dtype: string
- name: post_index
dtype: int64
- name: post_id
dtype: string
- name: thread_id
dtype: string
- name: scraped_at
dtype: string
- name: reply_count
dtype: int64
- name: view_count
dtype: int64
- name: tags
sequence: string
- name: cve_refs
sequence: string
- name: dataset_generated_at
dtype: string
- name: release_mode
dtype: string
- name: released_artifact
dtype: string
- name: redaction_reason
dtype: string
- config_name: task1_cve_linkage
data_files:
- split: train
path: benchmark_v2/task1_cve_linkage/train.jsonl
- split: validation
path: benchmark_v2/task1_cve_linkage/val.jsonl
- split: test
path: benchmark_v2/task1_cve_linkage/test.jsonl
- split: corpus
path: benchmark_v2/task1_cve_linkage/corpus.jsonl
features:
- name: id
dtype: string
- name: text
dtype: string
- name: cve_id
dtype: string
- name: source
dtype: string
- name: timestamp
dtype: string
- config_name: task2_exploit_type
data_files:
- split: train
path: benchmark_v2/task2_exploit_type/train.jsonl
- split: validation
path: benchmark_v2/task2_exploit_type/val.jsonl
- split: test
path: benchmark_v2/task2_exploit_type/test.jsonl
features:
- name: id
dtype: string
- name: text
dtype: string
- name: label
dtype: string
- name: source
dtype: string
- name: timestamp
dtype: string
- config_name: task3_temporal_generalization
data_files:
- split: train
path: benchmark_v2/task3_temporal_generalization/train.jsonl
- split: validation
path: benchmark_v2/task3_temporal_generalization/val.jsonl
- split: test
path: benchmark_v2/task3_temporal_generalization/test.jsonl
- split: corpus
path: benchmark_v2/task3_temporal_generalization/corpus.jsonl
features:
- name: id
dtype: string
- name: text
dtype: string
- name: cve_id
dtype: string
- name: source
dtype: string
- name: timestamp
dtype: string
HackerSignal
A large-scale, multi-source dataset linking hacker community discourse, exploit databases, vulnerability advisories, and fix commits through a shared CVE identifier space.
Overview
| Statistic | Value |
|---|---|
| Documents | 7,447,646 (exact-deduplicated) |
| Sources | 64 public forum/source identifiers |
| Source layers | 8 |
| Temporal span | 1988--2026 |
| CVE-linked rows | 360,004 |
| Benchmark tasks | 3 |
Quick Start
from datasets import load_dataset
# Load the 10K stratified sample (24 MB)
sample = load_dataset("DatasetSubmission/HackerSignal", "sample")
# Load a benchmark task
task1 = load_dataset("DatasetSubmission/HackerSignal", "task1_cve_linkage")
# Load the full corpus (12 GB)
full = load_dataset("DatasetSubmission/HackerSignal", "default")
Source Layers
| Layer | Description | Rows |
|---|---|---|
hacker_community |
Forum posts from hacker/security communities | 6,974,128 |
exploit_archive |
Published exploit code and advisories | 197,393 |
vulnerability_reference |
NVD CVE descriptions and structured advisories | 150,916 |
exploit_qa_reference |
Security Q&A and tutorial content | 68,791 |
advisory_reference |
Vendor and third-party security advisories | 30,361 |
bug_bounty_disclosure |
Public bug bounty reports | 13,720 |
fix_commit_reference |
Vulnerability fix commit messages | 11,104 |
exploitation_reference |
Active exploitation indicators (CISA KEV) | 1,233 |
Benchmark Tasks
Task 1: CVE Linkage Retrieval (CVE-R)
Cross-source temporally OOD entity grounding: given exploit/advisory evidence text, retrieve the correct NVD CVE entry from a corpus of 340K descriptions. Queries come from 22 source identifiers across exploit archives, advisories, fix commits, and bug bounty reports; filtered to ≥8 tokens.
| Split | Rows |
|---|---|
| Train | 56,692 |
| Val | 2,584 |
| Test | 1,990 |
| Corpus | 340,536 |
Task 2: Exploit Type Classification (ETC)
8-class temporal OOD classification of exploit posts by type: injection, XSS, memory corruption, DoS, file inclusion, authentication/access bypass, RCE, and information disclosure. Sourced from ExploitDB and HackerOne public reports; split by publication year so test posts postdate all training examples.
| Split | Rows |
|---|---|
| Train | 64,413 |
| Val | 4,735 |
| Test | 1,735 |
Task 3: Temporal Generalization (TG)
Identical retrieval formulation to Task 1 but with strict CVE-disjoint constraint: C_train ∩ C_test = ∅. Split by CVE publication year (train: <2022, test: 2024+) to test generalization to wholly unseen vulnerabilities.
| Split | Rows |
|---|---|
| Train | 56,833 |
| Val | 2,535 |
| Test | 1,898 |
| Corpus | 340,536 |
Schema
Each record in the main corpus contains:
| Field | Type | Description |
|---|---|---|
unified_id |
string | SHA-256-derived release identifier |
source_dataset |
string | Input source file or dataset name |
source_layer |
string | Normalized layer (see above) |
text |
string | UTF-8 post/advisory text (max 8000 chars) |
timestamp |
string | ISO 8601 publication datetime (UTC) |
forum_id |
string | Source identifier |
author_hash |
string | SHA-256 pseudonymized author |
release_mode |
string | Governance mode (see below) |
Release Governance
Records follow source-specific release modes:
redistributable_text(5 sources): Full text included under public-domain or CC licenses.research_text_with_terms(9 sources): Text included with source attribution; no commercial reuse.metadata_or_pointer_only(13 sources): Only metadata, timestamps, CVE refs, text hashes, and lengths; raw text withheld.
See docs/release_governance.md for the full source matrix, takedown policy, and responsible-use restrictions.
Responsible Use
This dataset is intended for defensive cybersecurity research only. Prohibited uses include:
- Training systems for automated exploit code generation or malware
- De-anonymizing forum participants outside approved research protocols
- Operational blocking or law-enforcement decisions based solely on model outputs
- Republishing text from
metadata_or_pointer_onlysources
Known Issues
- HuggingFace dataset viewer row count: The viewer may display a partial count (~1M) for the
default/fullsplit because HF's streaming viewer cannot fully index files over ~10 GB. The actual row count is 7,447,646 as validated against the SHA-256 manifest. - Content-scanner warnings: HF's automated scanner flags several files (including the sample JSONL) as "Unsafe" due to exploit and vulnerability text. This is expected for a cybersecurity research dataset and does not indicate malicious content. See the Responsible Use section below.
Limitations
- English-language bias; non-English communities may be underrepresented
- Historical forum imports skew toward 2015--2017
- Task labels are weak (CVE-linkage-derived), not human-annotated
- ~8% near-duplicate content remains after exact deduplication
- 1.57M rows under 8 tokens (useful for interaction analysis, not classification)
Citation
@misc{hackersignal2026,
title={{HackerSignal}: A Temporally Structured, Multi-Source Benchmark for Cybersecurity Threat Intelligence},
author={Anonymous},
year={2026},
howpublished={arXiv preprint}
}
License
Code and metadata: CC BY 4.0. Source text retains source-specific terms documented in the governance addendum and release manifest.