File size: 11,325 Bytes
18c57b3
 
 
 
 
 
 
 
 
 
cd986c0
18c57b3
 
 
 
 
 
 
 
 
 
 
 
 
 
c78089d
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
18c57b3
 
 
 
 
c78089d
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
18c57b3
 
 
 
c78089d
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2eb3895
18c57b3
 
2eb3895
18c57b3
2eb3895
18c57b3
2eb3895
18c57b3
2eb3895
c78089d
 
 
 
 
 
 
 
 
 
 
c2d279d
18c57b3
 
c2d279d
18c57b3
c2d279d
18c57b3
c2d279d
c78089d
 
 
 
 
 
 
 
 
 
 
2eb3895
18c57b3
 
2eb3895
18c57b3
2eb3895
18c57b3
2eb3895
18c57b3
2eb3895
c78089d
 
 
 
 
 
 
 
 
 
 
18c57b3
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2eb3895
18c57b3
 
 
 
 
 
 
16b35db
18c57b3
 
2eb3895
18c57b3
 
16b35db
18c57b3
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2eb3895
ba4bf0d
18c57b3
 
 
ba4bf0d
 
 
18c57b3
 
c2d279d
 
18c57b3
 
 
c2d279d
 
 
18c57b3
2eb3895
 
18c57b3
 
 
ba4bf0d
 
 
18c57b3
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
c2d279d
 
 
 
 
18c57b3
 
 
 
 
 
 
 
 
 
 
70ac206
 
18c57b3
70ac206
 
18c57b3
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
---
language:
- en
- zh
- ru
license: cc-by-4.0
size_categories:
- 1M<n<10M
task_categories:
- text-classification
- text-retrieval
tags:
- cybersecurity
- exploit
- vulnerability
- CVE
- hacker-forum
- threat-intelligence
- NLP
- benchmark
pretty_name: HackerSignal
dataset_info:
  splits:
  - name: full
    num_examples: 7447646
  features:
  - name: unified_id
    dtype: string
  - name: source_dataset
    dtype: string
  - name: source_file
    dtype: string
  - name: source_format
    dtype: string
  - name: source_layer
    dtype: string
  - name: source_record_id
    dtype: string
  - name: forum_id
    dtype: string
  - name: timestamp
    dtype: string
  - name: author_hash
    dtype: string
  - name: text
    dtype: string
  - name: text_raw
    dtype: string
  - name: text_length
    dtype: int64
  - name: text_raw_length
    dtype: int64
  - name: text_sha256
    dtype: string
  - name: text_raw_sha256
    dtype: string
  - name: thread_url
    dtype: string
  - name: thread_title
    dtype: string
  - name: section
    dtype: string
  - name: post_index
    dtype: int64
  - name: post_id
    dtype: string
  - name: thread_id
    dtype: string
  - name: scraped_at
    dtype: string
  - name: reply_count
    dtype: int64
  - name: view_count
    dtype: int64
  - name: tags
    sequence: string
  - name: cve_refs
    sequence: string
  - name: dataset_generated_at
    dtype: string
  - name: release_mode
    dtype: string
  - name: released_artifact
    dtype: string
  - name: redaction_reason
    dtype: string
configs:
- config_name: default
  data_files:
  - split: full
    path: unified_hacker_communities_neurips_public.jsonl
  features:
  - name: unified_id
    dtype: string
  - name: source_dataset
    dtype: string
  - name: source_file
    dtype: string
  - name: source_format
    dtype: string
  - name: source_layer
    dtype: string
  - name: source_record_id
    dtype: string
  - name: forum_id
    dtype: string
  - name: timestamp
    dtype: string
  - name: author_hash
    dtype: string
  - name: text
    dtype: string
  - name: text_raw
    dtype: string
  - name: text_length
    dtype: int64
  - name: text_raw_length
    dtype: int64
  - name: text_sha256
    dtype: string
  - name: text_raw_sha256
    dtype: string
  - name: thread_url
    dtype: string
  - name: thread_title
    dtype: string
  - name: section
    dtype: string
  - name: post_index
    dtype: int64
  - name: post_id
    dtype: string
  - name: thread_id
    dtype: string
  - name: scraped_at
    dtype: string
  - name: reply_count
    dtype: int64
  - name: view_count
    dtype: int64
  - name: tags
    sequence: string
  - name: cve_refs
    sequence: string
  - name: dataset_generated_at
    dtype: string
  - name: release_mode
    dtype: string
  - name: released_artifact
    dtype: string
  - name: redaction_reason
    dtype: string
- config_name: sample
  data_files:
  - split: full
    path: hackersignal_sample_10k.jsonl
  features:
  - name: unified_id
    dtype: string
  - name: source_dataset
    dtype: string
  - name: source_file
    dtype: string
  - name: source_format
    dtype: string
  - name: source_layer
    dtype: string
  - name: source_record_id
    dtype: string
  - name: forum_id
    dtype: string
  - name: timestamp
    dtype: string
  - name: author_hash
    dtype: string
  - name: text
    dtype: string
  - name: text_raw
    dtype: string
  - name: text_length
    dtype: int64
  - name: text_raw_length
    dtype: int64
  - name: text_sha256
    dtype: string
  - name: text_raw_sha256
    dtype: string
  - name: thread_url
    dtype: string
  - name: thread_title
    dtype: string
  - name: section
    dtype: string
  - name: post_index
    dtype: int64
  - name: post_id
    dtype: string
  - name: thread_id
    dtype: string
  - name: scraped_at
    dtype: string
  - name: reply_count
    dtype: int64
  - name: view_count
    dtype: int64
  - name: tags
    sequence: string
  - name: cve_refs
    sequence: string
  - name: dataset_generated_at
    dtype: string
  - name: release_mode
    dtype: string
  - name: released_artifact
    dtype: string
  - name: redaction_reason
    dtype: string
- config_name: task1_cve_linkage
  data_files:
  - split: train
    path: benchmark_v2/task1_cve_linkage/train.jsonl
  - split: validation
    path: benchmark_v2/task1_cve_linkage/val.jsonl
  - split: test
    path: benchmark_v2/task1_cve_linkage/test.jsonl
  - split: corpus
    path: benchmark_v2/task1_cve_linkage/corpus.jsonl
  features:
  - name: id
    dtype: string
  - name: text
    dtype: string
  - name: cve_id
    dtype: string
  - name: source
    dtype: string
  - name: timestamp
    dtype: string
- config_name: task2_exploit_type
  data_files:
  - split: train
    path: benchmark_v2/task2_exploit_type/train.jsonl
  - split: validation
    path: benchmark_v2/task2_exploit_type/val.jsonl
  - split: test
    path: benchmark_v2/task2_exploit_type/test.jsonl
  features:
  - name: id
    dtype: string
  - name: text
    dtype: string
  - name: label
    dtype: string
  - name: source
    dtype: string
  - name: timestamp
    dtype: string
- config_name: task3_temporal_generalization
  data_files:
  - split: train
    path: benchmark_v2/task3_temporal_generalization/train.jsonl
  - split: validation
    path: benchmark_v2/task3_temporal_generalization/val.jsonl
  - split: test
    path: benchmark_v2/task3_temporal_generalization/test.jsonl
  - split: corpus
    path: benchmark_v2/task3_temporal_generalization/corpus.jsonl
  features:
  - name: id
    dtype: string
  - name: text
    dtype: string
  - name: cve_id
    dtype: string
  - name: source
    dtype: string
  - name: timestamp
    dtype: string
---

# HackerSignal

A large-scale, multi-source dataset linking hacker community discourse, exploit databases, vulnerability advisories, and fix commits through a shared CVE identifier space.

## Overview

| Statistic | Value |
|-----------|-------|
| Documents | 7,447,646 (exact-deduplicated) |
| Sources | 64 public forum/source identifiers |
| Source layers | 8 |
| Temporal span | 1988--2026 |
| CVE-linked rows | 360,004 |
| Benchmark tasks | 3 |

## Quick Start

```python
from datasets import load_dataset

# Load the 10K stratified sample (24 MB)
sample = load_dataset("DatasetSubmission/HackerSignal", "sample")

# Load a benchmark task
task1 = load_dataset("DatasetSubmission/HackerSignal", "task1_cve_linkage")

# Load the full corpus (12 GB)
full = load_dataset("DatasetSubmission/HackerSignal", "default")
```

## Source Layers

| Layer | Description | Rows |
|-------|-------------|------|
| `hacker_community` | Forum posts from hacker/security communities | 6,974,128 |
| `exploit_archive` | Published exploit code and advisories | 197,393 |
| `vulnerability_reference` | NVD CVE descriptions and structured advisories | 150,916 |
| `exploit_qa_reference` | Security Q&A and tutorial content | 68,791 |
| `advisory_reference` | Vendor and third-party security advisories | 30,361 |
| `bug_bounty_disclosure` | Public bug bounty reports | 13,720 |
| `fix_commit_reference` | Vulnerability fix commit messages | 11,104 |
| `exploitation_reference` | Active exploitation indicators (CISA KEV) | 1,233 |

## Benchmark Tasks

### Task 1: CVE Linkage Retrieval (CVE-R)
Cross-source temporally OOD entity grounding: given exploit/advisory evidence text, retrieve the correct NVD CVE entry from a corpus of 340K descriptions. Queries come from 22 source identifiers across exploit archives, advisories, fix commits, and bug bounty reports; filtered to ≥8 tokens.

| Split | Rows |
|-------|------|
| Train | 56,692 |
| Val | 2,584 |
| Test | 1,990 |
| Corpus | 340,536 |

### Task 2: Exploit Type Classification (ETC)
8-class temporal OOD classification of exploit posts by type: injection, XSS, memory corruption, DoS, file inclusion, authentication/access bypass, RCE, and information disclosure. Sourced from ExploitDB and HackerOne public reports; split by publication year so test posts postdate all training examples.

| Split | Rows |
|-------|------|
| Train | 64,413 |
| Val | 4,735 |
| Test | 1,735 |

### Task 3: Temporal Generalization (TG)
Identical retrieval formulation to Task 1 but with strict CVE-disjoint constraint: C_train ∩ C_test = ∅. Split by CVE publication year (train: <2022, test: 2024+) to test generalization to wholly unseen vulnerabilities.

| Split | Rows |
|-------|------|
| Train | 56,833 |
| Val | 2,535 |
| Test | 1,898 |
| Corpus | 340,536 |

## Schema

Each record in the main corpus contains:

| Field | Type | Description |
|-------|------|-------------|
| `unified_id` | string | SHA-256-derived release identifier |
| `source_dataset` | string | Input source file or dataset name |
| `source_layer` | string | Normalized layer (see above) |
| `text` | string | UTF-8 post/advisory text (max 8000 chars) |
| `timestamp` | string | ISO 8601 publication datetime (UTC) |
| `forum_id` | string | Source identifier |
| `author_hash` | string | SHA-256 pseudonymized author |
| `release_mode` | string | Governance mode (see below) |

## Release Governance

Records follow source-specific release modes:

- **`redistributable_text`** (5 sources): Full text included under public-domain or CC licenses.
- **`research_text_with_terms`** (9 sources): Text included with source attribution; no commercial reuse.
- **`metadata_or_pointer_only`** (13 sources): Only metadata, timestamps, CVE refs, text hashes, and lengths; raw text withheld.

See `docs/release_governance.md` for the full source matrix, takedown policy, and responsible-use restrictions.

## Responsible Use

This dataset is intended for **defensive cybersecurity research** only. Prohibited uses include:
- Training systems for automated exploit code generation or malware
- De-anonymizing forum participants outside approved research protocols
- Operational blocking or law-enforcement decisions based solely on model outputs
- Republishing text from `metadata_or_pointer_only` sources

## Known Issues

- **HuggingFace dataset viewer row count**: The viewer may display a partial count (~1M) for the `default/full` split because HF's streaming viewer cannot fully index files over ~10 GB. The actual row count is 7,447,646 as validated against the SHA-256 manifest.
- **Content-scanner warnings**: HF's automated scanner flags several files (including the sample JSONL) as "Unsafe" due to exploit and vulnerability text. This is expected for a cybersecurity research dataset and does not indicate malicious content. See the Responsible Use section below.

## Limitations

- English-language bias; non-English communities may be underrepresented
- Historical forum imports skew toward 2015--2017
- Task labels are weak (CVE-linkage-derived), not human-annotated
- ~8% near-duplicate content remains after exact deduplication
- 1.57M rows under 8 tokens (useful for interaction analysis, not classification)

## Citation

```bibtex
@misc{hackersignal2026,
  title={{HackerSignal}: A Temporally Structured, Multi-Source Benchmark for Cybersecurity Threat Intelligence},
  author={Anonymous},
  year={2026},
  howpublished={arXiv preprint}
}
```

## License

Code and metadata: CC BY 4.0. Source text retains source-specific terms documented in the governance addendum and release manifest.