data_source
stringclasses
1 value
prompt
listlengths
2
2
ability
stringclasses
1 value
reward_model
dict
extra_info
dict
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [ "make_pw_hash" ], "cwe": "CWE-327", "cwes_present": [], "filename": "handler.py", "index": 8200, "language": "python", "options": [ "read_secure_cookie", "done", "make_salt", "make_pw_hash" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_pa...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "make_pw_hash", "style": "rule" }
{ "all_acceptable": [ "make_pw_hash" ], "cwe": "CWE-327", "cwes_present": [], "filename": "handler.py", "index": 8201, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/handler.py", "source_repo": "ChaseLyall/udacity-blog-project", "sp...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "text_to_db.py", "index": 8202, "language": "python", "options": [ "CWE-117", "CWE-943", "CWE-74", "CWE-312", "CWE-22", "CWE-326" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "sourc...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-312", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "text_to_db.py", "index": 8203, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/model/DB Automation/text_to_db.py", "source_repo": "chrisdcao/Covid_Map_Hanoi...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "B", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "commands.py", "index": 8204, "language": "python", "options": [ "CWE-943", "CWE-312", "CWE-730", "CWE-732", "CWE-601", "CWE-20" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-312", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "commands.py", "index": 8205, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/pww/commands.py", "source_repo": "meganehouser/pww", "split": "train", "tar...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "C", "style": "rule" }
{ "all_acceptable": [ "cmd" ], "cwe": "CWE-312", "cwes_present": [], "filename": "commands.py", "index": 8206, "language": "python", "options": [ "ShowCommand", "AddCommand", "cmd", "Command" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/pww/commands....
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "cmd", "style": "rule" }
{ "all_acceptable": [ "cmd" ], "cwe": "CWE-312", "cwes_present": [], "filename": "commands.py", "index": 8207, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/pww/commands.py", "source_repo": "meganehouser/pww", "split": "train", "...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "A", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-209" ], "filename": "app.py", "index": 8208, "language": "python", "options": [ "CWE-209", "CWE-116", "CWE-327", "CWE-89", "CWE-215", "CWE-22" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path"...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-209", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-209" ], "filename": "app.py", "index": 8209, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/app.py", "source_repo": "masaponto/dentaku2", "split": "train", "target_function...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "C,F", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-22", "CWE-732" ], "filename": "intellij-idea-community.py", "index": 8210, "language": "python", "options": [ "CWE-116", "CWE-209", "CWE-22", "CWE-1004", "CWE-79", "CWE-732" ], "source_dataset": "OctoReasoner/c...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-22,CWE-732", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-22", "CWE-732" ], "filename": "intellij-idea-community.py", "index": 8211, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/intellij/intellij-idea/intellij-idea-community.py", ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "C", "style": "rule" }
{ "all_acceptable": [ "untarArchive" ], "cwe": "CWE-22", "cwes_present": [], "filename": "intellij-idea-community.py", "index": 8212, "language": "python", "options": [ "cleanExit", "getSha256ForFile", "untarArchive" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_p...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "untarArchive", "style": "rule" }
{ "all_acceptable": [ "untarArchive" ], "cwe": "CWE-22", "cwes_present": [], "filename": "intellij-idea-community.py", "index": 8213, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/intellij/intellij-idea/intellij-idea-community.py", "...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-22" ], "filename": "home.py", "index": 8214, "language": "python", "options": [ "CWE-327", "CWE-1333", "CWE-94", "CWE-22", "CWE-918", "CWE-943" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-22", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-22" ], "filename": "home.py", "index": 8215, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/app/controllers/home.py", "source_repo": "bhavesha-systango/ml-waywt-rec", "split"...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "B", "style": "rule" }
{ "all_acceptable": [ "index" ], "cwe": "CWE-22", "cwes_present": [], "filename": "home.py", "index": 8216, "language": "python", "options": [ "about", "index", "display_image", "results" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/app/controllers/h...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "index", "style": "rule" }
{ "all_acceptable": [ "index" ], "cwe": "CWE-22", "cwes_present": [], "filename": "home.py", "index": 8217, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/app/controllers/home.py", "source_repo": "bhavesha-systango/ml-waywt-rec", "s...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "F", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-20" ], "filename": "wordSegment.py", "index": 8218, "language": "python", "options": [ "CWE-295", "CWE-1333", "CWE-326", "CWE-89", "CWE-730", "CWE-20" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "sour...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-20", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-20" ], "filename": "wordSegment.py", "index": 8219, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/new_words_detection/wordSegment.py", "source_repo": "skykiseki/NewWordDectect...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "A", "style": "rule" }
{ "all_acceptable": [ "gen_words" ], "cwe": "CWE-20", "cwes_present": [], "filename": "wordSegment.py", "index": 8220, "language": "python", "options": [ "gen_words", "__init__", "update_word", "extract_cadicateword" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "sour...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "gen_words", "style": "rule" }
{ "all_acceptable": [ "gen_words" ], "cwe": "CWE-20", "cwes_present": [], "filename": "wordSegment.py", "index": 8221, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/new_words_detection/wordSegment.py", "source_repo": "skykiseki/NewWo...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "C", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-79" ], "filename": "float_image.py", "index": 8222, "language": "python", "options": [ "CWE-74", "CWE-1333", "CWE-79", "CWE-20", "CWE-312", "CWE-113" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "sourc...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-79", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-79" ], "filename": "float_image.py", "index": 8223, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/folium/plugins/float_image.py", "source_repo": "python-visualization/folium",...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "B", "style": "rule" }
{ "all_acceptable": [ "FloatImage" ], "cwe": "CWE-79", "cwes_present": [], "filename": "float_image.py", "index": 8224, "language": "python", "options": [ "__init__", "FloatImage" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/folium/plugins/float_image.py", ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "FloatImage", "style": "rule" }
{ "all_acceptable": [ "FloatImage" ], "cwe": "CWE-79", "cwes_present": [], "filename": "float_image.py", "index": 8225, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/folium/plugins/float_image.py", "source_repo": "python-visualizatio...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "E", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-113" ], "filename": "pythons.py", "index": 8226, "language": "python", "options": [ "CWE-295", "CWE-90", "CWE-89", "CWE-74", "CWE-113", "CWE-94" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_pat...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-113", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-113" ], "filename": "pythons.py", "index": 8227, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/api/pythons.py", "source_repo": "S0urceC0der/pyenv-mirror", "split": "train", ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "B", "style": "rule" }
{ "all_acceptable": [ "do_GET" ], "cwe": "CWE-113", "cwes_present": [], "filename": "pythons.py", "index": 8228, "language": "python", "options": [ "handler", "do_GET", "main", "do_HEAD" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/api/pythons.py", ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "do_GET", "style": "rule" }
{ "all_acceptable": [ "do_GET" ], "cwe": "CWE-113", "cwes_present": [], "filename": "pythons.py", "index": 8229, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/api/pythons.py", "source_repo": "S0urceC0der/pyenv-mirror", "split": "tr...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "F", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-20" ], "filename": "model.py", "index": 8230, "language": "python", "options": [ "CWE-90", "CWE-601", "CWE-312", "CWE-1333", "CWE-730", "CWE-20" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_pat...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-20", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-20" ], "filename": "model.py", "index": 8231, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/app/model.py", "source_repo": "SalesAppi/JPSSM_topics", "split": "train", "targ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "C", "style": "rule" }
{ "all_acceptable": [ "remove_special_characters" ], "cwe": "CWE-20", "cwes_present": [], "filename": "model.py", "index": 8232, "language": "python", "options": [ "create_stopwords", "remove_shorts", "remove_special_characters", "normalize" ], "source_dataset": "OctoReasoner/cod...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "remove_special_characters", "style": "rule" }
{ "all_acceptable": [ "remove_special_characters" ], "cwe": "CWE-20", "cwes_present": [], "filename": "model.py", "index": 8233, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/app/model.py", "source_repo": "SalesAppi/JPSSM_topics", ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "A,C", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-215", "CWE-79" ], "filename": "blog.py", "index": 8234, "language": "python", "options": [ "CWE-79", "CWE-918", "CWE-215", "CWE-377", "CWE-611", "CWE-943" ], "source_dataset": "OctoReasoner/codeql2_aggressive",...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-79,CWE-215", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-79", "CWE-215" ], "filename": "blog.py", "index": 8235, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/blog-project/blog.py", "source_repo": "esragarip28/Flask_Blog_Project...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "A", "style": "rule" }
{ "all_acceptable": [ "article" ], "cwe": "CWE-79", "cwes_present": [], "filename": "blog.py", "index": 8236, "language": "python", "options": [ "article", "about", "login", "decorated_function" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/blog-proje...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "article", "style": "rule" }
{ "all_acceptable": [ "article" ], "cwe": "CWE-79", "cwes_present": [], "filename": "blog.py", "index": 8237, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/blog-project/blog.py", "source_repo": "esragarip28/Flask_Blog_Project", "sp...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "C", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-327" ], "filename": "main.py", "index": 8238, "language": "python", "options": [ "CWE-295", "CWE-78", "CWE-327", "CWE-601", "CWE-117", "CWE-1004" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_pa...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-327", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-327" ], "filename": "main.py", "index": 8239, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/pypasswords/main.py", "source_repo": "CosmoSt4r/pypasswords", "split": "train", ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "C", "style": "rule" }
{ "all_acceptable": [ "hash_password" ], "cwe": "CWE-327", "cwes_present": [], "filename": "main.py", "index": 8240, "language": "python", "options": [ "generate_it", "salt_password", "hash_password", "add_local_parameter" ], "source_dataset": "OctoReasoner/codeql2_aggressive", ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "hash_password", "style": "rule" }
{ "all_acceptable": [ "hash_password" ], "cwe": "CWE-327", "cwes_present": [], "filename": "main.py", "index": 8241, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/pypasswords/main.py", "source_repo": "CosmoSt4r/pypasswords", "split...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-601" ], "filename": "routes.py", "index": 8242, "language": "python", "options": [ "CWE-502", "CWE-1333", "CWE-78", "CWE-601", "CWE-377", "CWE-611" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-601", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-601" ], "filename": "routes.py", "index": 8243, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/app/routes.py", "source_repo": "daryavasilyeva/lms", "split": "train", "targe...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "B", "style": "rule" }
{ "all_acceptable": [ "login" ], "cwe": "CWE-601", "cwes_present": [], "filename": "routes.py", "index": 8244, "language": "python", "options": [ "register", "login", "get_code", "add_course" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/app/routes.py...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "login", "style": "rule" }
{ "all_acceptable": [ "login" ], "cwe": "CWE-601", "cwes_present": [], "filename": "routes.py", "index": 8245, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/app/routes.py", "source_repo": "daryavasilyeva/lms", "split": "train", "...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "E", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "8.3.2.py", "index": 8246, "language": "python", "options": [ "CWE-326", "CWE-22", "CWE-502", "CWE-116", "CWE-312", "CWE-94" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_pat...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-312", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "8.3.2.py", "index": 8247, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/Data structures/8.3.2.py", "source_repo": "MosheBakshi/HANGMAN", "split": "train...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "B", "style": "rule" }
{ "all_acceptable": [ "menu_for_main" ], "cwe": "CWE-312", "cwes_present": [], "filename": "8.3.2.py", "index": 8248, "language": "python", "options": [ "main", "menu_for_main" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/Data structures/8.3.2.py", "source...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "menu_for_main", "style": "rule" }
{ "all_acceptable": [ "menu_for_main" ], "cwe": "CWE-312", "cwes_present": [], "filename": "8.3.2.py", "index": 8249, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/Data structures/8.3.2.py", "source_repo": "MosheBakshi/HANGMAN", "s...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-295" ], "filename": "Interacting with SourceForge.py", "index": 8250, "language": "python", "options": [ "CWE-94", "CWE-377", "CWE-215", "CWE-295", "CWE-20", "CWE-209" ], "source_dataset": "OctoReasoner/codeql2_agg...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-295", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-295" ], "filename": "Interacting with SourceForge.py", "index": 8251, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/Chapter04/Interacting with SourceForge.py", "source_repo": ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-295" ], "filename": "nrg.py", "index": 8252, "language": "python", "options": [ "CWE-502", "CWE-90", "CWE-74", "CWE-295", "CWE-377", "CWE-78" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path":...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-295", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-295" ], "filename": "nrg.py", "index": 8253, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/nrg.py", "source_repo": "cthit/misc", "split": "train", "target_function": "", ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "C", "style": "rule" }
{ "all_acceptable": [ "main" ], "cwe": "CWE-295", "cwes_present": [], "filename": "nrg.py", "index": 8254, "language": "python", "options": [ "define_arguments", "print_service_data", "main", "output_html" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "main", "style": "rule" }
{ "all_acceptable": [ "main" ], "cwe": "CWE-295", "cwes_present": [], "filename": "nrg.py", "index": 8255, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/nrg.py", "source_repo": "cthit/misc", "split": "train", "target_function": "...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-295" ], "filename": "poweriq-dualpdu.py", "index": 8256, "language": "python", "options": [ "CWE-1333", "CWE-614", "CWE-377", "CWE-295", "CWE-732", "CWE-943" ], "source_dataset": "OctoReasoner/codeql2_aggressive", ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-295", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-295" ], "filename": "poweriq-dualpdu.py", "index": 8257, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/poweriq-dualpdu.py", "source_repo": "r4yfx/poweriq-grafana", "split": ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "Oauth.py", "index": 8258, "language": "python", "options": [ "CWE-200", "CWE-730", "CWE-78", "CWE-312", "CWE-502", "CWE-74" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_pat...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-312", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "Oauth.py", "index": 8259, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/Programs/Evernote/EvernoteController/Oauth.py", "source_repo": "varequan/EasierLif...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [ "__get_token" ], "cwe": "CWE-312", "cwes_present": [], "filename": "Oauth.py", "index": 8260, "language": "python", "options": [ "oauth", "line_write", "__get_tmp_token", "__get_token" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "__get_token", "style": "rule" }
{ "all_acceptable": [ "__get_token" ], "cwe": "CWE-312", "cwes_present": [], "filename": "Oauth.py", "index": 8261, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/Programs/Evernote/EvernoteController/Oauth.py", "source_repo": "varequa...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "B,F", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-209", "CWE-215" ], "filename": "shortcut_api.py", "index": 8262, "language": "python", "options": [ "CWE-730", "CWE-215", "CWE-113", "CWE-1333", "CWE-776", "CWE-209" ], "source_dataset": "OctoReasoner/codeql2_a...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-209,CWE-215", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-209", "CWE-215" ], "filename": "shortcut_api.py", "index": 8263, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/shortcut_api.py", "source_repo": "save1s/shortcut-api", "s...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [ "result" ], "cwe": "CWE-209", "cwes_present": [], "filename": "shortcut_api.py", "index": 8264, "language": "python", "options": [ "check_morning_exercise", "card_recharge", "card_net_balance", "result" ], "source_dataset": "OctoReasoner/codeql2_aggressive",...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "result", "style": "rule" }
{ "all_acceptable": [ "result" ], "cwe": "CWE-209", "cwes_present": [], "filename": "shortcut_api.py", "index": 8265, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/shortcut_api.py", "source_repo": "save1s/shortcut-api", "split": "t...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-327" ], "filename": "utils.py", "index": 8266, "language": "python", "options": [ "CWE-20", "CWE-732", "CWE-74", "CWE-327", "CWE-611", "CWE-90" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-327", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-327" ], "filename": "utils.py", "index": 8267, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/onlineafspraken/api/utils.py", "source_repo": "HosniD/onlineafspraken-wrapper", ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [ "build_param" ], "cwe": "CWE-327", "cwes_present": [], "filename": "utils.py", "index": 8268, "language": "python", "options": [ "build_signature", "clean_signature_value", "parse_schema", "build_param" ], "source_dataset": "OctoReasoner/codeql2_aggressive",...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "build_param", "style": "rule" }
{ "all_acceptable": [ "build_param" ], "cwe": "CWE-327", "cwes_present": [], "filename": "utils.py", "index": 8269, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/onlineafspraken/api/utils.py", "source_repo": "HosniD/onlineafspraken-w...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "B", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-79" ], "filename": "arkivist.py", "index": 8270, "language": "python", "options": [ "CWE-732", "CWE-79", "CWE-326", "CWE-89", "CWE-730", "CWE-215" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_p...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-79", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-79" ], "filename": "arkivist.py", "index": 8271, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/arkivist.py", "source_repo": "dgorley/arkivist", "split": "train", "target_f...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "C", "style": "rule" }
{ "all_acceptable": [ "write_html_index" ], "cwe": "CWE-79", "cwes_present": [], "filename": "arkivist.py", "index": 8272, "language": "python", "options": [ "write_email_to_file", "delete_message", "write_html_index", "retrieve_headers" ], "source_dataset": "OctoReasoner/codeql2...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "write_html_index", "style": "rule" }
{ "all_acceptable": [ "write_html_index" ], "cwe": "CWE-79", "cwes_present": [], "filename": "arkivist.py", "index": 8273, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/arkivist.py", "source_repo": "dgorley/arkivist", "split": "tra...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "F", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-22" ], "filename": "main.py", "index": 8274, "language": "python", "options": [ "CWE-90", "CWE-326", "CWE-502", "CWE-200", "CWE-89", "CWE-22" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path":...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-22", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-22" ], "filename": "main.py", "index": 8275, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/main.py", "source_repo": "kilianr20/yt-dlp-back", "split": "train", "target_func...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "A", "style": "rule" }
{ "all_acceptable": [ "downloadYTSong" ], "cwe": "CWE-22", "cwes_present": [], "filename": "main.py", "index": 8276, "language": "python", "options": [ "downloadYTSong", "wakeUp" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/main.py", "source_repo": "kilian...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "downloadYTSong", "style": "rule" }
{ "all_acceptable": [ "downloadYTSong" ], "cwe": "CWE-22", "cwes_present": [], "filename": "main.py", "index": 8277, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/main.py", "source_repo": "kilianr20/yt-dlp-back", "split": "train", ...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "B", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "hangman.py", "index": 8278, "language": "python", "options": [ "CWE-1004", "CWE-312", "CWE-326", "CWE-116", "CWE-215", "CWE-209" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "sourc...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-312", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "hangman.py", "index": 8279, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/hangman/hangman.py", "source_repo": "jersson/learning-python-with-games", "spl...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "B", "style": "rule" }
{ "all_acceptable": [ "hangman" ], "cwe": "CWE-312", "cwes_present": [], "filename": "hangman.py", "index": 8280, "language": "python", "options": [ "getAvailableLetters", "hangman", "isWordGuessed", "getGuessedWord" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "sour...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "hangman", "style": "rule" }
{ "all_acceptable": [ "hangman" ], "cwe": "CWE-312", "cwes_present": [], "filename": "hangman.py", "index": 8281, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/hangman/hangman.py", "source_repo": "jersson/learning-python-with-games",...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "A", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-295" ], "filename": "putJSONdata_SF_Bikes_service.py", "index": 8282, "language": "python", "options": [ "CWE-295", "CWE-74", "CWE-1004", "CWE-377", "CWE-918", "CWE-78" ], "source_dataset": "OctoReasoner/codeql2_ag...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-295", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-295" ], "filename": "putJSONdata_SF_Bikes_service.py", "index": 8283, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/COMPLETE_SOLUTIONS/North American General Bike Feed/putJSONda...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "C", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-79" ], "filename": "build_configs.py", "index": 8284, "language": "python", "options": [ "CWE-1333", "CWE-78", "CWE-79", "CWE-295", "CWE-22", "CWE-200" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "sou...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-79", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-79" ], "filename": "build_configs.py", "index": 8285, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/source-of-truth/build_configs.py", "source_repo": "hpreston/netdevops_demos...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "A", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "deploy.py", "index": 8286, "language": "python", "options": [ "CWE-312", "CWE-200", "CWE-22", "CWE-377", "CWE-614", "CWE-20" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_pa...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-312", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "deploy.py", "index": 8287, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/scripts/deploy.py", "source_repo": "rkassa/viz", "split": "train", "target_fu...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "C", "style": "rule" }
{ "all_acceptable": [ "replace_string_in_dest_file" ], "cwe": "CWE-312", "cwes_present": [], "filename": "deploy.py", "index": 8288, "language": "python", "options": [ "copy_contents", "deploy", "replace_string_in_dest_file", "insert_analytics_code" ], "source_dataset": "OctoReas...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "replace_string_in_dest_file", "style": "rule" }
{ "all_acceptable": [ "replace_string_in_dest_file" ], "cwe": "CWE-312", "cwes_present": [], "filename": "deploy.py", "index": 8289, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/scripts/deploy.py", "source_repo": "rkassa/viz", "sp...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-89" ], "filename": "database.py", "index": 8290, "language": "python", "options": [ "CWE-312", "CWE-200", "CWE-215", "CWE-89", "CWE-918", "CWE-732" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-89", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-89" ], "filename": "database.py", "index": 8291, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/project/project_code/aws/cloudmesh/database.py", "source_repo": "cloudmesh-commu...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "A", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-295" ], "filename": "client.py", "index": 8292, "language": "python", "options": [ "CWE-295", "CWE-918", "CWE-327", "CWE-732", "CWE-78", "CWE-377" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_p...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-295", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-295" ], "filename": "client.py", "index": 8293, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/openchatbotclient/client.py", "source_repo": "konverso-ai/open-chatbot-py-client"...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter...
code_security
{ "ground_truth": "A", "style": "rule" }
{ "all_acceptable": [ "ask" ], "cwe": "CWE-295", "cwes_present": [], "filename": "client.py", "index": 8294, "language": "python", "options": [ "ask", "from_descriptor", "__str__", "get_descriptor" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/opencha...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap...
code_security
{ "ground_truth": "ask", "style": "rule" }
{ "all_acceptable": [ "ask" ], "cwe": "CWE-295", "cwes_present": [], "filename": "client.py", "index": 8295, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/openchatbotclient/client.py", "source_repo": "konverso-ai/open-chatbot-py-clie...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "E", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-79" ], "filename": "flexconfig.py", "index": 8296, "language": "python", "options": [ "CWE-1333", "CWE-78", "CWE-732", "CWE-74", "CWE-79", "CWE-89" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-79", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-79" ], "filename": "flexconfig.py", "index": 8297, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/flexconfig.py", "source_repo": "Mierdin/pyflex", "split": "train", "target...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of...
code_security
{ "ground_truth": "D", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "sshh.py", "index": 8298, "language": "python", "options": [ "CWE-209", "CWE-776", "CWE-200", "CWE-312", "CWE-79", "CWE-732" ], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_pat...
sast_cwe
[ { "content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog...
code_security
{ "ground_truth": "CWE-312", "style": "rule" }
{ "all_acceptable": [], "cwe": "", "cwes_present": [ "CWE-312" ], "filename": "sshh.py", "index": 8299, "language": "python", "options": [], "source_dataset": "OctoReasoner/codeql2_aggressive", "source_path": "/src/sshh/sshh.py", "source_repo": "janhybs/linux-utils", "split": "train", "tar...