data_source stringclasses 1
value | prompt listlengths 2 2 | ability stringclasses 1
value | reward_model dict | extra_info dict |
|---|---|---|---|---|
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "E",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "authrization_api.py",
"index": 1200,
"language": "python",
"options": [
"CWE-502",
"CWE-94",
"CWE-614",
"CWE-730",
"CWE-312",
"CWE-377"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "authrization_api.py",
"index": 1201,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/api/authrization_api.py",
"source_repo": "TusharMalakar/NYClibrary-API"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "Personal Diary.py",
"index": 1202,
"language": "python",
"options": [
"CWE-94",
"CWE-1333",
"CWE-312",
"CWE-113",
"CWE-732",
"CWE-643"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "Personal Diary.py",
"index": 1203,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/Personal Diary.py",
"source_repo": "samhithchalla/Python",
"split": "tr... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [
"reg"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "Personal Diary.py",
"index": 1204,
"language": "python",
"options": [
"reg",
"editFile",
"createFile",
"regAcct"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/Personal D... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "reg",
"style": "rule"
} | {
"all_acceptable": [
"reg"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "Personal Diary.py",
"index": 1205,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/Personal Diary.py",
"source_repo": "samhithchalla/Python",
"split": ... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-918"
],
"filename": "app.py",
"index": 1206,
"language": "python",
"options": [
"CWE-20",
"CWE-732",
"CWE-377",
"CWE-918",
"CWE-643",
"CWE-74"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-918",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-918"
],
"filename": "app.py",
"index": 1207,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/app.py",
"source_repo": "han928/CAC",
"split": "train",
"target_function": "",
... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [
"getSearchResults"
],
"cwe": "CWE-918",
"cwes_present": [],
"filename": "app.py",
"index": 1208,
"language": "python",
"options": [
"processRequest",
"getSearchText",
"audiencecreation",
"getSearchResults"
],
"source_dataset": "OctoReasoner/codeql1_aggressiv... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "getSearchResults",
"style": "rule"
} | {
"all_acceptable": [
"getSearchResults"
],
"cwe": "CWE-918",
"cwes_present": [],
"filename": "app.py",
"index": 1209,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/app.py",
"source_repo": "han928/CAC",
"split": "train",
"target_... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "secret_key.py",
"index": 1210,
"language": "python",
"options": [
"CWE-643",
"CWE-943",
"CWE-295",
"CWE-312",
"CWE-200",
"CWE-209"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"sou... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "secret_key.py",
"index": 1211,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/cms_files/management/commands/secret_key.py",
"source_repo": "sstacha/uweb-in... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [
"set_secret"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "secret_key.py",
"index": 1212,
"language": "python",
"options": [
"set_secret",
"handle",
"add_arguments",
"generate_secret"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "set_secret",
"style": "rule"
} | {
"all_acceptable": [
"set_secret"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "secret_key.py",
"index": 1213,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/cms_files/management/commands/secret_key.py",
"source_repo": "sstac... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "Lab02.py",
"index": 1214,
"language": "python",
"options": [
"CWE-326",
"CWE-117",
"CWE-312",
"CWE-94",
"CWE-614",
"CWE-601"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_pa... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "Lab02.py",
"index": 1215,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/Lab02.py",
"source_repo": "gksmfzz1/JavaProject",
"split": "train",
"target_fu... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295"
],
"filename": "014_pandas_convert_json_wp.py",
"index": 1216,
"language": "python",
"options": [
"CWE-502",
"CWE-327",
"CWE-295",
"CWE-1333",
"CWE-117",
"CWE-209"
],
"source_dataset": "OctoReasoner/codeql1_ag... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-295",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295"
],
"filename": "014_pandas_convert_json_wp.py",
"index": 1217,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/stop_starting_start_stopping/pandas_convert_json/014_pandas_con... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "B,C",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-215",
"CWE-89"
],
"filename": "CC_0125_0172_0242_1557_users.py",
"index": 1218,
"language": "python",
"options": [
"CWE-94",
"CWE-89",
"CWE-215",
"CWE-643",
"CWE-611",
"CWE-614"
],
"source_dataset": "OctoReason... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-89,CWE-215",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-89",
"CWE-215"
],
"filename": "CC_0125_0172_0242_1557_users.py",
"index": 1219,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/a3/users/users/CC_0125_0172_0242_1557_users.py"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-79"
],
"filename": "serialization.py",
"index": 1220,
"language": "python",
"options": [
"CWE-79",
"CWE-377",
"CWE-74",
"CWE-943",
"CWE-327",
"CWE-502"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"sou... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-79",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-79"
],
"filename": "serialization.py",
"index": 1221,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/soil/serialization.py",
"source_repo": "fadesibert/soil",
"split": "train... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [
"expand_template"
],
"cwe": "CWE-79",
"cwes_present": [],
"filename": "serialization.py",
"index": 1222,
"language": "python",
"options": [
"deserializer",
"serializer",
"name",
"expand_template"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"sou... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "expand_template",
"style": "rule"
} | {
"all_acceptable": [
"expand_template"
],
"cwe": "CWE-79",
"cwes_present": [],
"filename": "serialization.py",
"index": 1223,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/soil/serialization.py",
"source_repo": "fadesibert/soil",
... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "cardio.py",
"index": 1224,
"language": "python",
"options": [
"CWE-22",
"CWE-943",
"CWE-312",
"CWE-601",
"CWE-78",
"CWE-1333"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_p... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "cardio.py",
"index": 1225,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/examples/eigen_stratified_models/cardio.py",
"source_repo": "ketanrajawat/strat_m... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "zoom_common.py",
"index": 1226,
"language": "python",
"options": [
"CWE-312",
"CWE-79",
"CWE-200",
"CWE-295",
"CWE-643",
"CWE-326"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"sou... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "zoom_common.py",
"index": 1227,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/fn_create_zoom_meeting/fn_create_zoom_meeting/util/zoom_common.py",
"source_... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [
"generate_meeting_post"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "zoom_common.py",
"index": 1228,
"language": "python",
"options": [
"strip_password_from_join_url",
"__init__",
"create_meeting",
"generate_meeting_post"
],
"source_dataset": "OctoR... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "generate_meeting_post",
"style": "rule"
} | {
"all_acceptable": [
"generate_meeting_post"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "zoom_common.py",
"index": 1229,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/fn_create_zoom_meeting/fn_create_zoom_meeting/util/zoom_c... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "B",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-22"
],
"filename": "lambda.py",
"index": 1230,
"language": "python",
"options": [
"CWE-776",
"CWE-22",
"CWE-732",
"CWE-943",
"CWE-502",
"CWE-1333"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_p... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-22",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-22"
],
"filename": "lambda.py",
"index": 1231,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/arsenal/tensorflow/aws/lambda.py",
"source_repo": "nropatas/faasbenchmark",
"spl... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [
"maybe_download_and_extract"
],
"cwe": "CWE-22",
"cwes_present": [],
"filename": "lambda.py",
"index": 1232,
"language": "python",
"options": [
"maybe_download_and_extract",
"load",
"main",
"NodeLookup"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "maybe_download_and_extract",
"style": "rule"
} | {
"all_acceptable": [
"maybe_download_and_extract"
],
"cwe": "CWE-22",
"cwes_present": [],
"filename": "lambda.py",
"index": 1233,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/arsenal/tensorflow/aws/lambda.py",
"source_repo": "nropa... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-22"
],
"filename": "SelectAndDownloadModel.py",
"index": 1234,
"language": "python",
"options": [
"CWE-22",
"CWE-1333",
"CWE-377",
"CWE-643",
"CWE-614",
"CWE-215"
],
"source_dataset": "OctoReasoner/codeql1_aggressi... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-22",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-22"
],
"filename": "SelectAndDownloadModel.py",
"index": 1235,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/SelectAndDownloadModel.py",
"source_repo": "MahimanaGIT/DeepLabSem... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295"
],
"filename": "one.py",
"index": 1236,
"language": "python",
"options": [
"CWE-295",
"CWE-117",
"CWE-327",
"CWE-732",
"CWE-1004",
"CWE-377"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_pa... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-295",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295"
],
"filename": "one.py",
"index": 1237,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/one.py",
"source_repo": "MrPiy/YandeMrPiy",
"split": "train",
"target_function":... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295"
],
"filename": "scrapper_example.py",
"index": 1238,
"language": "python",
"options": [
"CWE-295",
"CWE-1004",
"CWE-776",
"CWE-502",
"CWE-74",
"CWE-215"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-295",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295"
],
"filename": "scrapper_example.py",
"index": 1239,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/Chapter02/scrapper_example.py",
"source_repo": "kpranke/Getting-Started... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-22"
],
"filename": "fileio.py",
"index": 1240,
"language": "python",
"options": [
"CWE-94",
"CWE-1333",
"CWE-22",
"CWE-78",
"CWE-200",
"CWE-643"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_pat... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-22",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-22"
],
"filename": "fileio.py",
"index": 1241,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/ir_datasets/util/fileio.py",
"source_repo": "ssun32/ir_datasets",
"split": "trai... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "B",
"style": "rule"
} | {
"all_acceptable": [
"path"
],
"cwe": "CWE-22",
"cwes_present": [],
"filename": "fileio.py",
"index": 1242,
"language": "python",
"options": [
"RelativePath",
"path",
"Bz2Extract",
"verify"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/ir_datasets/ut... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "path",
"style": "rule"
} | {
"all_acceptable": [
"path"
],
"cwe": "CWE-22",
"cwes_present": [],
"filename": "fileio.py",
"index": 1243,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/ir_datasets/util/fileio.py",
"source_repo": "ssun32/ir_datasets",
"split": "... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "F",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-79"
],
"filename": "generator.py",
"index": 1244,
"language": "python",
"options": [
"CWE-1004",
"CWE-611",
"CWE-116",
"CWE-943",
"CWE-601",
"CWE-79"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"sourc... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-79",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-79"
],
"filename": "generator.py",
"index": 1245,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/generator/generator.py",
"source_repo": "zx5656/sdl_java_suite",
"split": "tr... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [
"env"
],
"cwe": "CWE-79",
"cwes_present": [],
"filename": "generator.py",
"index": 1246,
"language": "python",
"options": [
"write_file",
"versions_compatibility_validating",
"env",
"get_version"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"sou... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "env",
"style": "rule"
} | {
"all_acceptable": [
"env"
],
"cwe": "CWE-79",
"cwes_present": [],
"filename": "generator.py",
"index": 1247,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/generator/generator.py",
"source_repo": "zx5656/sdl_java_suite",
"split": ... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-20"
],
"filename": "convert.py",
"index": 1248,
"language": "python",
"options": [
"CWE-295",
"CWE-94",
"CWE-20",
"CWE-327",
"CWE-116",
"CWE-200"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_pa... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-20",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-20"
],
"filename": "convert.py",
"index": 1249,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/src/utils/convert.py",
"source_repo": "i2r-simmc/i2r-simmc-2020",
"split": "tra... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [
"parse_flattened_result"
],
"cwe": "CWE-20",
"cwes_present": [],
"filename": "convert.py",
"index": 1250,
"language": "python",
"options": [
"represent_visual_objects",
"parse_flattened_results_from_file",
"parse_flattened_result",
"convert_json_to_flattened"
... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "parse_flattened_result",
"style": "rule"
} | {
"all_acceptable": [
"parse_flattened_result"
],
"cwe": "CWE-20",
"cwes_present": [],
"filename": "convert.py",
"index": 1251,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/src/utils/convert.py",
"source_repo": "i2r-simmc/i2r-simmc-... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "B",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "__init__.py",
"index": 1252,
"language": "python",
"options": [
"CWE-377",
"CWE-312",
"CWE-614",
"CWE-74",
"CWE-20",
"CWE-116"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "__init__.py",
"index": 1253,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/goatmeister/__init__.py",
"source_repo": "stevenorum/goatmeister",
"split": "... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [
"dump_runner_map"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "__init__.py",
"index": 1254,
"language": "python",
"options": [
"dump_runner_map",
"clean",
"get_year",
"pull_race_name"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "dump_runner_map",
"style": "rule"
} | {
"all_acceptable": [
"dump_runner_map"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "__init__.py",
"index": 1255,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/goatmeister/__init__.py",
"source_repo": "stevenorum/goatmeister... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "购物车.py",
"index": 1256,
"language": "python",
"options": [
"CWE-74",
"CWE-1004",
"CWE-94",
"CWE-312",
"CWE-295",
"CWE-643"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "购物车.py",
"index": 1257,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/2019-03-23/购物车.py",
"source_repo": "ItdeerLab/PythonDemo",
"split": "train",
"ta... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "B,D",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-215",
"CWE-22"
],
"filename": "__init__.py",
"index": 1258,
"language": "python",
"options": [
"CWE-113",
"CWE-215",
"CWE-611",
"CWE-22",
"CWE-312",
"CWE-326"
],
"source_dataset": "OctoReasoner/codeql1_aggressi... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-22,CWE-215",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-22",
"CWE-215"
],
"filename": "__init__.py",
"index": 1259,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/__init__.py",
"source_repo": "HighDeFing/Ozone_Prueba",
"split"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "E",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-327"
],
"filename": "data_to_nightscout.py",
"index": 1260,
"language": "python",
"options": [
"CWE-78",
"CWE-377",
"CWE-22",
"CWE-326",
"CWE-327",
"CWE-200"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-327",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-327"
],
"filename": "data_to_nightscout.py",
"index": 1261,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/data_to_nightscout.py",
"source_repo": "Nightscou2018/nightscout_bulk... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "B,C",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295",
"CWE-312"
],
"filename": "ssh_brute_force.py",
"index": 1262,
"language": "python",
"options": [
"CWE-215",
"CWE-295",
"CWE-312",
"CWE-918",
"CWE-200",
"CWE-776"
],
"source_dataset": "OctoReasoner/codeql1... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-295,CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295",
"CWE-312"
],
"filename": "ssh_brute_force.py",
"index": 1263,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/chapter7/paramiko/ssh brute force/ssh_brute_force.py",
"s... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [
"brute_force_ssh"
],
"cwe": "CWE-295",
"cwes_present": [],
"filename": "ssh_brute_force.py",
"index": 1264,
"language": "python",
"options": [
"brute_force_ssh",
"main"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/chapter7/paramiko/ssh ... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "brute_force_ssh",
"style": "rule"
} | {
"all_acceptable": [
"brute_force_ssh"
],
"cwe": "CWE-295",
"cwes_present": [],
"filename": "ssh_brute_force.py",
"index": 1265,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/chapter7/paramiko/ssh brute force/ssh_brute_force.py",
"s... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [
"brute_force_ssh"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "ssh_brute_force.py",
"index": 1266,
"language": "python",
"options": [
"brute_force_ssh",
"main"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/chapter7/paramiko/ssh ... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "brute_force_ssh",
"style": "rule"
} | {
"all_acceptable": [
"brute_force_ssh"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "ssh_brute_force.py",
"index": 1267,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/chapter7/paramiko/ssh brute force/ssh_brute_force.py",
"s... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-20"
],
"filename": "response_parser.py",
"index": 1268,
"language": "python",
"options": [
"CWE-20",
"CWE-209",
"CWE-22",
"CWE-295",
"CWE-643",
"CWE-89"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"so... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-20",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-20"
],
"filename": "response_parser.py",
"index": 1269,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/trueimpactdataset_analysis/data/response_parser.py",
"source_repo": "robo... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [
"parse_responses"
],
"cwe": "CWE-20",
"cwes_present": [],
"filename": "response_parser.py",
"index": 1270,
"language": "python",
"options": [
"_get_columns",
"save_data",
"__init__",
"parse_responses"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "parse_responses",
"style": "rule"
} | {
"all_acceptable": [
"parse_responses"
],
"cwe": "CWE-20",
"cwes_present": [],
"filename": "response_parser.py",
"index": 1271,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/trueimpactdataset_analysis/data/response_parser.py",
"sour... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "B,F",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-215",
"CWE-918"
],
"filename": "app.py",
"index": 1272,
"language": "python",
"options": [
"CWE-776",
"CWE-918",
"CWE-117",
"CWE-74",
"CWE-643",
"CWE-215"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-215,CWE-918",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-215",
"CWE-918"
],
"filename": "app.py",
"index": 1273,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/server/app.py",
"source_repo": "dangoldin/connect-four",
"split": "... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-116"
],
"filename": "check_website.py",
"index": 1274,
"language": "python",
"options": [
"CWE-116",
"CWE-79",
"CWE-312",
"CWE-1004",
"CWE-117",
"CWE-200"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-116",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-116"
],
"filename": "check_website.py",
"index": 1275,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/check_website.py",
"source_repo": "thelabs-dev/check-website-changes",
"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [
"wget"
],
"cwe": "CWE-116",
"cwes_present": [],
"filename": "check_website.py",
"index": 1276,
"language": "python",
"options": [
"dircheck_and_create",
"filecheck_and_create",
"run_check",
"wget"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"so... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "wget",
"style": "rule"
} | {
"all_acceptable": [
"wget"
],
"cwe": "CWE-116",
"cwes_present": [],
"filename": "check_website.py",
"index": 1277,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/check_website.py",
"source_repo": "thelabs-dev/check-website-changes",... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-79"
],
"filename": "jinja_yaml_magic.py",
"index": 1278,
"language": "python",
"options": [
"CWE-78",
"CWE-22",
"CWE-326",
"CWE-79",
"CWE-113",
"CWE-502"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"s... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-79",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-79"
],
"filename": "jinja_yaml_magic.py",
"index": 1279,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/jinja_yaml_magic/jinja_yaml_magic.py",
"source_repo": "nopdotcom/jupyter... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [
"jinja_template"
],
"cwe": "CWE-79",
"cwes_present": [],
"filename": "jinja_yaml_magic.py",
"index": 1280,
"language": "python",
"options": [
"yaml",
"JinjaMagics",
"jinja_template",
"identity"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"sourc... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "jinja_template",
"style": "rule"
} | {
"all_acceptable": [
"jinja_template"
],
"cwe": "CWE-79",
"cwes_present": [],
"filename": "jinja_yaml_magic.py",
"index": 1281,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/jinja_yaml_magic/jinja_yaml_magic.py",
"source_repo": "nop... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "B",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "post_activity_logs.py",
"index": 1282,
"language": "python",
"options": [
"CWE-200",
"CWE-312",
"CWE-943",
"CWE-89",
"CWE-116",
"CWE-94"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "post_activity_logs.py",
"index": 1283,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/DOCS/examples/post_activity_logs.py",
"source_repo": "GhostManager/Gh... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-209"
],
"filename": "api.py",
"index": 1284,
"language": "python",
"options": [
"CWE-209",
"CWE-22",
"CWE-89",
"CWE-113",
"CWE-94",
"CWE-943"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path":... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-209",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-209"
],
"filename": "api.py",
"index": 1285,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/toolkit/api.py",
"source_repo": "daftshady/dropbeat",
"split": "train",
"target_... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "B",
"style": "rule"
} | {
"all_acceptable": [
"wrapper"
],
"cwe": "CWE-209",
"cwes_present": [],
"filename": "api.py",
"index": 1286,
"language": "python",
"options": [
"Api",
"wrapper",
"__init__",
"register"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/toolkit/api.py",
... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "wrapper",
"style": "rule"
} | {
"all_acceptable": [
"wrapper"
],
"cwe": "CWE-209",
"cwes_present": [],
"filename": "api.py",
"index": 1287,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/toolkit/api.py",
"source_repo": "daftshady/dropbeat",
"split": "train",
"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "E",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-327"
],
"filename": "apns.py",
"index": 1288,
"language": "python",
"options": [
"CWE-74",
"CWE-94",
"CWE-20",
"CWE-943",
"CWE-327",
"CWE-918"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-327",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-327"
],
"filename": "apns.py",
"index": 1289,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/apns.py",
"source_repo": "jianoll/Bird",
"split": "train",
"target_function": "... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295"
],
"filename": "scrape_website.py",
"index": 1290,
"language": "python",
"options": [
"CWE-215",
"CWE-614",
"CWE-918",
"CWE-295",
"CWE-502",
"CWE-22"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-295",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295"
],
"filename": "scrape_website.py",
"index": 1291,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/python/scrape_website.py",
"source_repo": "valdirjunior011/Scripts_Infras... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "F",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-117"
],
"filename": "main.py",
"index": 1292,
"language": "python",
"options": [
"CWE-116",
"CWE-732",
"CWE-776",
"CWE-643",
"CWE-611",
"CWE-117"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_pa... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-117",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-117"
],
"filename": "main.py",
"index": 1293,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/main.py",
"source_repo": "nucklehead/kisa-kidi-nan-bib-kreyol",
"split": "train",... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [
"post"
],
"cwe": "CWE-117",
"cwes_present": [],
"filename": "main.py",
"index": 1294,
"language": "python",
"options": [
"Itilizate",
"Liv",
"Anrejistre",
"post"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/main.py",
"source_r... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "post",
"style": "rule"
} | {
"all_acceptable": [
"post"
],
"cwe": "CWE-117",
"cwes_present": [],
"filename": "main.py",
"index": 1295,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/main.py",
"source_repo": "nucklehead/kisa-kidi-nan-bib-kreyol",
"split": "tra... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-79"
],
"filename": "generate.py",
"index": 1296,
"language": "python",
"options": [
"CWE-22",
"CWE-116",
"CWE-79",
"CWE-732",
"CWE-295",
"CWE-601"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_p... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-79",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-79"
],
"filename": "generate.py",
"index": 1297,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/generate.py",
"source_repo": "Keenuts/cv-builder",
"split": "train",
"target... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [
"CreateFromTemplate"
],
"cwe": "CWE-79",
"cwes_present": [],
"filename": "generate.py",
"index": 1298,
"language": "python",
"options": [
"LoadBlock",
"LoadInfo",
"CreateFromTemplate",
"CoverLoadBlocks"
],
"source_dataset": "OctoReasoner/codeql1_aggressive",... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "CreateFromTemplate",
"style": "rule"
} | {
"all_acceptable": [
"CreateFromTemplate"
],
"cwe": "CWE-79",
"cwes_present": [],
"filename": "generate.py",
"index": 1299,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql1_aggressive",
"source_path": "/generate.py",
"source_repo": "Keenuts/cv-builder",
"split": ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.