Update README.md
Browse files
README.md
CHANGED
|
@@ -1,20 +1,60 @@
|
|
| 1 |
---
|
| 2 |
-
pretty_name: "Security Reasoning Agent - Thought Traces"
|
| 3 |
-
task_categories:
|
| 4 |
-
- text-generation
|
| 5 |
-
- zero-shot-classification
|
| 6 |
language:
|
| 7 |
- en
|
|
|
|
|
|
|
|
|
|
|
|
|
| 8 |
tags:
|
| 9 |
-
- security
|
|
|
|
| 10 |
- chain-of-thought
|
| 11 |
-
-
|
| 12 |
-
- vulnerability-analysis
|
| 13 |
-
- agent
|
| 14 |
-
- cybersecurity
|
| 15 |
-
- burp-suite
|
| 16 |
-
- reasoning
|
| 17 |
- synthetic
|
| 18 |
-
|
| 19 |
-
|
| 20 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
---
|
|
|
|
|
|
|
|
|
|
|
|
|
| 2 |
language:
|
| 3 |
- en
|
| 4 |
+
license: mit
|
| 5 |
+
task_categories:
|
| 6 |
+
- text-generation
|
| 7 |
+
- text-classification
|
| 8 |
tags:
|
| 9 |
+
- cyber-security
|
| 10 |
+
- red-teaming
|
| 11 |
- chain-of-thought
|
| 12 |
+
- agent-reasoning
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 13 |
- synthetic
|
| 14 |
+
dataset_info:
|
| 15 |
+
features:
|
| 16 |
+
- name: instruction
|
| 17 |
+
dtype: string
|
| 18 |
+
- name: response
|
| 19 |
+
dtype: string
|
| 20 |
+
- name: hypothesis
|
| 21 |
+
dtype: string
|
| 22 |
+
- name: confirmed
|
| 23 |
+
dtype: bool
|
| 24 |
+
- name: severity
|
| 25 |
+
dtype: string
|
| 26 |
+
splits:
|
| 27 |
+
- name: train
|
| 28 |
+
num_bytes: 73400320
|
| 29 |
+
num_examples: 100000
|
| 30 |
+
download_size: 73400320
|
| 31 |
+
dataset_size: 73400320
|
| 32 |
+
configs:
|
| 33 |
+
- config_name: default
|
| 34 |
+
data_files:
|
| 35 |
+
- split: train
|
| 36 |
+
path: security_dataset.jsonl
|
| 37 |
+
---
|
| 38 |
+
|
| 39 |
+
# 🛡️ Security Analyst CoT Dataset (100k)
|
| 40 |
+
|
| 41 |
+
A massive-scale, synthetically generated dataset designed to train **AI Security Agents** in offensive reasoning, vulnerability verification, and false positive reduction.
|
| 42 |
+
|
| 43 |
+
## Dataset Summary
|
| 44 |
+
- **Size:** 100,000 Unique Samples
|
| 45 |
+
- **Format:** JSONL
|
| 46 |
+
- **Focus:** Chain-of-Thought (CoT) Reasoning for Web Security
|
| 47 |
+
- **Logic:** Observation -> Hypothesis -> Evidence -> Decision (O-H-E-D)
|
| 48 |
+
|
| 49 |
+
## Features
|
| 50 |
+
Each sample simulates a complete cognitive process of a Senior Security Analyst:
|
| 51 |
+
1. **Instruction**: The raw HTTP request + The server's response code/body.
|
| 52 |
+
2. **Reasoning**: A `
|
| 53 |
+
|
| 54 |
+
<div class="think">` block analyzing the anomaly, evidence, and conclusion.<br />3. **Verdict**: Structured labels for `STATUS`, `SEVERITY`, and `NEXT_TEST`.<br /><br />## Attack Categories<br />The dataset covers a wide spectrum of modern web threats:<br />- **Injection**: SQLi, XSS (Reflected/Stored), Command Injection, LDAPi.<br />- **Business Logic**: Price Manipulation, Mass Assignment, Race Conditions.<br />- **Protocol**: HTTP Request Smuggling, Host Header Injection.<br />- **Anomalies**: Zero-Day simulations (Unknown patterns) and Fuzzing noise.<br />- **Benign**: High-entropy legitimate traffic to train False Positive rejection.<br /><br />## Sample Structure<br />```json<br />{<br /> "instruction": "Analyze: GET /api/v1/user?id=1' OR 1=1 HTTP/1.1...",<br /> "response": "<think>\nObservation: ...\nHypothesis: ...\nEvidence: ...\nDecision: ...\n</div>
|
| 55 |
+
|
| 56 |
+
\nSTATUS: VULNERABLE...",
|
| 57 |
+
"hypothesis": "SQL Injection",
|
| 58 |
+
"confirmed": true,
|
| 59 |
+
"severity": "Critical"
|
| 60 |
+
}
|