fgfg / README.md
PanchiaNN's picture
Update README.md
492ced9 verified
---
language:
- en
license: mit
task_categories:
- text-generation
- text-classification
tags:
- cyber-security
- red-teaming
- chain-of-thought
- agent-reasoning
- synthetic
dataset_info:
features:
- name: instruction
dtype: string
- name: response
dtype: string
- name: hypothesis
dtype: string
- name: confirmed
dtype: bool
- name: severity
dtype: string
splits:
- name: train
num_bytes: 73400320
num_examples: 100000
download_size: 73400320
dataset_size: 73400320
configs:
- config_name: default
data_files:
- split: train
path: security_dataset.jsonl
---
# 🛡️ Security Analyst CoT Dataset (100k)
A massive-scale, synthetically generated dataset designed to train **AI Security Agents** in offensive reasoning, vulnerability verification, and false positive reduction.
## Dataset Summary
- **Size:** 100,000 Unique Samples
- **Format:** JSONL
- **Focus:** Chain-of-Thought (CoT) Reasoning for Web Security
- **Logic:** Observation -> Hypothesis -> Evidence -> Decision (O-H-E-D)
## Features
Each sample simulates a complete cognitive process of a Senior Security Analyst:
1. **Instruction**: The raw HTTP request + The server's response code/body.
2. **Reasoning**: A `
<div class="think">` block analyzing the anomaly, evidence, and conclusion.<br />3. **Verdict**: Structured labels for `STATUS`, `SEVERITY`, and `NEXT_TEST`.<br /><br />## Attack Categories<br />The dataset covers a wide spectrum of modern web threats:<br />- **Injection**: SQLi, XSS (Reflected/Stored), Command Injection, LDAPi.<br />- **Business Logic**: Price Manipulation, Mass Assignment, Race Conditions.<br />- **Protocol**: HTTP Request Smuggling, Host Header Injection.<br />- **Anomalies**: Zero-Day simulations (Unknown patterns) and Fuzzing noise.<br />- **Benign**: High-entropy legitimate traffic to train False Positive rejection.<br /><br />## Sample Structure<br />```json<br />{<br /> "instruction": "Analyze: GET /api/v1/user?id=1' OR 1=1 HTTP/1.1...",<br /> "response": "<think>\nObservation: ...\nHypothesis: ...\nEvidence: ...\nDecision: ...\n</div>
\nSTATUS: VULNERABLE...",
"hypothesis": "SQL Injection",
"confirmed": true,
"severity": "Critical"
}