DatasetSubmission commited on
Commit
c2d279d
·
verified ·
1 Parent(s): c5457a4

Update Task 2 config to exploit_type; add known-issues section (viewer count, unsafe-scan note)

Browse files
Files changed (1) hide show
  1. README.md +14 -12
README.md CHANGED
@@ -42,16 +42,14 @@ configs:
42
  path: benchmark_v2/task1_cve_linkage/test.jsonl
43
  - split: corpus
44
  path: benchmark_v2/task1_cve_linkage/corpus.jsonl
45
- - config_name: task2_signal_detection
46
  data_files:
47
  - split: train
48
- path: benchmark_v2/task2_signal_detection/train.jsonl
49
  - split: validation
50
- path: benchmark_v2/task2_signal_detection/val.jsonl
51
  - split: test
52
- path: benchmark_v2/task2_signal_detection/test.jsonl
53
- - split: corpus
54
- path: benchmark_v2/task2_signal_detection/corpus.jsonl
55
  - config_name: task3_temporal_generalization
56
  data_files:
57
  - split: train
@@ -119,15 +117,14 @@ Cross-source temporally OOD entity grounding: given exploit/advisory evidence te
119
  | Test | 550 |
120
  | Corpus | 340,536 |
121
 
122
- ### Task 2: Hacker Signal Detection (HSD)
123
- Two-stage task: (1) detect actionable exploit signals from hacker community noise, (2) ground positives to NVD CVE. 10:1 negative-to-positive ratio reflects real-world signal rarity.
124
 
125
  | Split | Rows |
126
  |-------|------|
127
- | Train | 4,202 |
128
- | Val | 1,606 |
129
- | Test | 407 |
130
- | Corpus | 340,536 |
131
 
132
  ### Task 3: Temporal Generalization (TG)
133
  Identical retrieval formulation to Task 1 but with strict CVE-disjoint constraint: C_train ∩ C_test = ∅. Split by CVE publication year (train: <2022, test: 2024+) to test generalization to wholly unseen vulnerabilities.
@@ -172,6 +169,11 @@ This dataset is intended for **defensive cybersecurity research** only. Prohibit
172
  - Operational blocking or law-enforcement decisions based solely on model outputs
173
  - Republishing text from `metadata_or_pointer_only` sources
174
 
 
 
 
 
 
175
  ## Limitations
176
 
177
  - English-language bias; non-English communities may be underrepresented
 
42
  path: benchmark_v2/task1_cve_linkage/test.jsonl
43
  - split: corpus
44
  path: benchmark_v2/task1_cve_linkage/corpus.jsonl
45
+ - config_name: task2_exploit_type
46
  data_files:
47
  - split: train
48
+ path: benchmark_v2/task2_exploit_type/train.jsonl
49
  - split: validation
50
+ path: benchmark_v2/task2_exploit_type/val.jsonl
51
  - split: test
52
+ path: benchmark_v2/task2_exploit_type/test.jsonl
 
 
53
  - config_name: task3_temporal_generalization
54
  data_files:
55
  - split: train
 
117
  | Test | 550 |
118
  | Corpus | 340,536 |
119
 
120
+ ### Task 2: Exploit Type Classification (ETC)
121
+ 8-class temporal OOD classification of exploit posts by type: injection, XSS, memory corruption, DoS, file inclusion, authentication/access bypass, RCE, and information disclosure. Sourced from ExploitDB and HackerOne public reports; split by publication year so test posts postdate all training examples.
122
 
123
  | Split | Rows |
124
  |-------|------|
125
+ | Train | 64,413 |
126
+ | Val | 4,735 |
127
+ | Test | 1,735 |
 
128
 
129
  ### Task 3: Temporal Generalization (TG)
130
  Identical retrieval formulation to Task 1 but with strict CVE-disjoint constraint: C_train ∩ C_test = ∅. Split by CVE publication year (train: <2022, test: 2024+) to test generalization to wholly unseen vulnerabilities.
 
169
  - Operational blocking or law-enforcement decisions based solely on model outputs
170
  - Republishing text from `metadata_or_pointer_only` sources
171
 
172
+ ## Known Issues
173
+
174
+ - **HuggingFace dataset viewer row count**: The viewer may display a partial count (~1M) for the `default/full` split because HF's streaming viewer cannot fully index files over ~10 GB. The actual row count is 7,447,646 as validated against the SHA-256 manifest.
175
+ - **Content-scanner warnings**: HF's automated scanner flags several files (including the sample JSONL) as "Unsafe" due to exploit and vulnerability text. This is expected for a cybersecurity research dataset and does not indicate malicious content. See the Responsible Use section below.
176
+
177
  ## Limitations
178
 
179
  - English-language bias; non-English communities may be underrepresented