harsharajkumar273 commited on
Commit
d968faa
·
verified ·
1 Parent(s): 5fdd9bf

Add detailed model card

Browse files
Files changed (1) hide show
  1. README.md +104 -160
README.md CHANGED
@@ -1,202 +1,146 @@
1
  ---
 
 
 
2
  base_model: codellama/CodeLlama-7b-instruct-hf
3
- library_name: peft
 
 
 
 
 
 
 
 
 
 
 
4
  ---
5
 
6
- # Model Card for Model ID
7
-
8
- <!-- Provide a quick summary of what the model is/does. -->
9
 
 
10
 
 
11
 
12
  ## Model Details
13
 
14
- ### Model Description
15
-
16
- <!-- Provide a longer summary of what this model is. -->
17
-
18
-
19
-
20
- - **Developed by:** [More Information Needed]
21
- - **Funded by [optional]:** [More Information Needed]
22
- - **Shared by [optional]:** [More Information Needed]
23
- - **Model type:** [More Information Needed]
24
- - **Language(s) (NLP):** [More Information Needed]
25
- - **License:** [More Information Needed]
26
- - **Finetuned from model [optional]:** [More Information Needed]
27
-
28
- ### Model Sources [optional]
29
-
30
- <!-- Provide the basic links for the model. -->
31
-
32
- - **Repository:** [More Information Needed]
33
- - **Paper [optional]:** [More Information Needed]
34
- - **Demo [optional]:** [More Information Needed]
35
-
36
- ## Uses
37
-
38
- <!-- Address questions around how the model is intended to be used, including the foreseeable users of the model and those affected by the model. -->
39
-
40
- ### Direct Use
41
-
42
- <!-- This section is for the model use without fine-tuning or plugging into a larger ecosystem/app. -->
43
-
44
- [More Information Needed]
45
-
46
- ### Downstream Use [optional]
47
-
48
- <!-- This section is for the model use when fine-tuned for a task, or when plugged into a larger ecosystem/app -->
49
-
50
- [More Information Needed]
51
-
52
- ### Out-of-Scope Use
53
-
54
- <!-- This section addresses misuse, malicious use, and uses that the model will not work well for. -->
55
-
56
- [More Information Needed]
57
-
58
- ## Bias, Risks, and Limitations
59
-
60
- <!-- This section is meant to convey both technical and sociotechnical limitations. -->
61
-
62
- [More Information Needed]
63
-
64
- ### Recommendations
65
-
66
- <!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
67
-
68
- Users (both direct and downstream) should be made aware of the risks, biases and limitations of the model. More information needed for further recommendations.
69
-
70
- ## How to Get Started with the Model
71
-
72
- Use the code below to get started with the model.
73
-
74
- [More Information Needed]
75
-
76
- ## Training Details
77
-
78
- ### Training Data
79
-
80
- <!-- This should link to a Dataset Card, perhaps with a short stub of information on what the training data is all about as well as documentation related to data pre-processing or additional filtering. -->
81
-
82
- [More Information Needed]
83
-
84
- ### Training Procedure
85
-
86
- <!-- This relates heavily to the Technical Specifications. Content here should link to that section when it is relevant to the training procedure. -->
87
-
88
- #### Preprocessing [optional]
89
-
90
- [More Information Needed]
91
-
92
-
93
- #### Training Hyperparameters
94
-
95
- - **Training regime:** [More Information Needed] <!--fp32, fp16 mixed precision, bf16 mixed precision, bf16 non-mixed precision, fp16 non-mixed precision, fp8 mixed precision -->
96
-
97
- #### Speeds, Sizes, Times [optional]
98
-
99
- <!-- This section provides information about throughput, start/end time, checkpoint size if relevant, etc. -->
100
-
101
- [More Information Needed]
102
-
103
- ## Evaluation
104
-
105
- <!-- This section describes the evaluation protocols and provides the results. -->
106
-
107
- ### Testing Data, Factors & Metrics
108
-
109
- #### Testing Data
110
-
111
- <!-- This should link to a Dataset Card if possible. -->
112
-
113
- [More Information Needed]
114
-
115
- #### Factors
116
-
117
- <!-- These are the things the evaluation is disaggregating by, e.g., subpopulations or domains. -->
118
-
119
- [More Information Needed]
120
-
121
- #### Metrics
122
-
123
- <!-- These are the evaluation metrics being used, ideally with a description of why. -->
124
-
125
- [More Information Needed]
126
-
127
- ### Results
128
-
129
- [More Information Needed]
130
-
131
- #### Summary
132
-
133
 
 
134
 
135
- ## Model Examination [optional]
136
 
137
- <!-- Relevant interpretability work for the model goes here -->
138
 
139
- [More Information Needed]
140
 
141
- ## Environmental Impact
 
 
 
 
 
142
 
143
- <!-- Total emissions (in grams of CO2eq) and additional considerations, such as electricity usage, go here. Edit the suggested text below accordingly -->
144
 
145
- Carbon emissions can be estimated using the [Machine Learning Impact calculator](https://mlco2.github.io/impact#compute) presented in [Lacoste et al. (2019)](https://arxiv.org/abs/1910.09700).
 
 
 
 
 
 
 
146
 
147
- - **Hardware Type:** [More Information Needed]
148
- - **Hours used:** [More Information Needed]
149
- - **Cloud Provider:** [More Information Needed]
150
- - **Compute Region:** [More Information Needed]
151
- - **Carbon Emitted:** [More Information Needed]
152
 
153
- ## Technical Specifications [optional]
 
 
154
 
155
- ### Model Architecture and Objective
156
 
157
- [More Information Needed]
158
 
159
- ### Compute Infrastructure
 
 
 
160
 
161
- [More Information Needed]
 
162
 
163
- #### Hardware
164
 
165
- [More Information Needed]
 
 
 
 
 
 
166
 
167
- #### Software
 
 
 
 
 
 
168
 
169
- [More Information Needed]
 
170
 
171
- ## Citation [optional]
 
172
 
173
- <!-- If there is a paper or blog post introducing the model, the APA and Bibtex information for that should go in this section. -->
 
174
 
175
- **BibTeX:**
176
 
177
- [More Information Needed]
178
 
179
- **APA:**
180
 
181
- [More Information Needed]
 
 
 
 
 
182
 
183
- ## Glossary [optional]
184
 
185
- <!-- If relevant, include terms and calculations in this section that can help readers understand the model or model card. -->
186
 
187
- [More Information Needed]
188
 
189
- ## More Information [optional]
 
 
190
 
191
- [More Information Needed]
192
 
193
- ## Model Card Authors [optional]
 
 
194
 
195
- [More Information Needed]
196
 
197
- ## Model Card Contact
198
 
199
- [More Information Needed]
200
- ### Framework versions
201
 
202
- - PEFT 0.14.0
 
1
  ---
2
+ language:
3
+ - en
4
+ license: llama2
5
  base_model: codellama/CodeLlama-7b-instruct-hf
6
+ tags:
7
+ - code
8
+ - security
9
+ - peft
10
+ - lora
11
+ - qlora
12
+ - vulnerability-detection
13
+ - api-security
14
+ - causal-lm
15
+ datasets:
16
+ - custom
17
+ pipeline_tag: text-generation
18
  ---
19
 
20
+ # API Security QLoRA Code Llama 7B
 
 
21
 
22
+ A QLoRA fine-tuned adapter on top of **CodeLlama-7b-instruct-hf**, trained to detect security vulnerabilities in API endpoint source code. Given a raw code snippet, the model produces a structured analysis identifying vulnerability type, severity, CWE, and a remediated version of the code.
23
 
24
+ ---
25
 
26
  ## Model Details
27
 
28
+ | Property | Value |
29
+ |---|---|
30
+ | **Base Model** | `codellama/CodeLlama-7b-instruct-hf` |
31
+ | **Fine-tuning Method** | QLoRA (4-bit NF4 quantization) |
32
+ | **LoRA Rank (r)** | 16 |
33
+ | **LoRA Alpha** | 32 |
34
+ | **LoRA Dropout** | 0.05 |
35
+ | **Target Modules** | `q_proj`, `k_proj`, `v_proj`, `o_proj` |
36
+ | **Task** | Causal LM / Code Security Analysis |
37
+ | **Training Steps** | 531 |
38
+ | **Training Hardware** | Google Colab T4 (16GB VRAM) |
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
39
 
40
+ ---
41
 
42
+ ## Training Data
43
 
44
+ Fine-tuned on a custom dataset of **10,000 API-specific vulnerability samples** (synthetic + augmented) covering 19 vulnerability types mapped to OWASP API Top 10.
45
 
46
+ ### Language Distribution
47
 
48
+ | Language | Share | Frameworks |
49
+ |---|---|---|
50
+ | Python | 46% | Flask, FastAPI, Django |
51
+ | JavaScript | 25% | Express.js, NestJS |
52
+ | Java | 15% | Spring Boot |
53
+ | PHP / Go / Ruby / C# | 14% | Laravel, Gin, Rails, ASP.NET |
54
 
55
+ ### Vulnerability Distribution
56
 
57
+ | Vulnerability | Samples | CWE |
58
+ |---|---|---|
59
+ | SQL Injection | 2,425 | CWE-89 |
60
+ | Mass Assignment | 1,307 | CWE-915 |
61
+ | Path Traversal | 943 | CWE-22 |
62
+ | IDOR | 860 | CWE-639 |
63
+ | Broken Authorization | 792 | CWE-285 |
64
+ | Command Injection | 600 | CWE-78 |
65
 
66
+ ### Severity Breakdown
 
 
 
 
67
 
68
+ - **Critical (43%)**: RCE, SQLi, unauthorized admin access
69
+ - **High (41%)**: Data leaks, IDOR, authorization bypass
70
+ - **Medium / Clean (16%)**: XSS, input validation warnings, baseline clean samples
71
 
72
+ ---
73
 
74
+ ## Usage
75
 
76
+ ```python
77
+ from transformers import AutoTokenizer, AutoModelForCausalLM
78
+ from peft import PeftModel
79
+ import torch
80
 
81
+ base_model_id = "codellama/CodeLlama-7b-instruct-hf"
82
+ adapter_id = "harsharajkumar273/api-security-qlora"
83
 
84
+ tokenizer = AutoTokenizer.from_pretrained(adapter_id, use_fast=False)
85
 
86
+ base = AutoModelForCausalLM.from_pretrained(
87
+ base_model_id,
88
+ torch_dtype=torch.float16,
89
+ device_map="auto",
90
+ )
91
+ model = PeftModel.from_pretrained(base, adapter_id)
92
+ model.eval()
93
 
94
+ code_snippet = """
95
+ @app.route('/user/<int:user_id>')
96
+ def get_user(user_id):
97
+ query = f"SELECT * FROM users WHERE id = {user_id}"
98
+ result = db.execute(query)
99
+ return jsonify(result)
100
+ """
101
 
102
+ prompt = f"[INST] Analyze this API endpoint for security vulnerabilities:\n\n{code_snippet} [/INST]"
103
+ inputs = tokenizer(prompt, return_tensors="pt").to(model.device)
104
 
105
+ with torch.no_grad():
106
+ outputs = model.generate(**inputs, max_new_tokens=512, temperature=0.1)
107
 
108
+ print(tokenizer.decode(outputs[0], skip_special_tokens=True))
109
+ ```
110
 
111
+ ---
112
 
113
+ ## Integration with API Security Scanner
114
 
115
+ This adapter is the default model in the [API Security Scanner](https://github.com/harsharajkumar/api-security) project. It is loaded automatically — no manual path configuration needed:
116
 
117
+ ```bash
118
+ git clone https://github.com/harsharajkumar/api-security
119
+ cd api-security
120
+ pip install -r requirements.txt
121
+ streamlit run app.py
122
+ ```
123
 
124
+ The scanner will download this adapter from the Hub on first run and cache it locally.
125
 
126
+ ---
127
 
128
+ ## Intended Use
129
 
130
+ - Automated API security auditing in CI/CD pipelines
131
+ - Developer tooling for identifying vulnerable endpoint patterns
132
+ - Security research and OWASP API Top 10 education
133
 
134
+ ## Out of Scope
135
 
136
+ - General-purpose code generation
137
+ - Non-API code (UI components, data processing scripts, etc.)
138
+ - Production security decisions without human review
139
 
140
+ ---
141
 
142
+ ## Credits
143
 
144
+ Developed as part of **CS6380 — API Security Project**
 
145
 
146
+ **Authors:** Siddhanth Nilesh Jagtap · Tanuj Kenchannavar · Harsha Raj Kumar