PanchiaNN commited on
Commit
492ced9
·
verified ·
1 Parent(s): ab163b8

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +54 -14
README.md CHANGED
@@ -1,20 +1,60 @@
1
  ---
2
- pretty_name: "Security Reasoning Agent - Thought Traces"
3
- task_categories:
4
- - text-generation
5
- - zero-shot-classification
6
  language:
7
  - en
 
 
 
 
8
  tags:
9
- - security-reasoning
 
10
  - chain-of-thought
11
- - pentesting
12
- - vulnerability-analysis
13
- - agent
14
- - cybersecurity
15
- - burp-suite
16
- - reasoning
17
  - synthetic
18
- size_categories:
19
- - n<1K
20
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
  ---
 
 
 
 
2
  language:
3
  - en
4
+ license: mit
5
+ task_categories:
6
+ - text-generation
7
+ - text-classification
8
  tags:
9
+ - cyber-security
10
+ - red-teaming
11
  - chain-of-thought
12
+ - agent-reasoning
 
 
 
 
 
13
  - synthetic
14
+ dataset_info:
15
+ features:
16
+ - name: instruction
17
+ dtype: string
18
+ - name: response
19
+ dtype: string
20
+ - name: hypothesis
21
+ dtype: string
22
+ - name: confirmed
23
+ dtype: bool
24
+ - name: severity
25
+ dtype: string
26
+ splits:
27
+ - name: train
28
+ num_bytes: 73400320
29
+ num_examples: 100000
30
+ download_size: 73400320
31
+ dataset_size: 73400320
32
+ configs:
33
+ - config_name: default
34
+ data_files:
35
+ - split: train
36
+ path: security_dataset.jsonl
37
+ ---
38
+
39
+ # 🛡️ Security Analyst CoT Dataset (100k)
40
+
41
+ A massive-scale, synthetically generated dataset designed to train **AI Security Agents** in offensive reasoning, vulnerability verification, and false positive reduction.
42
+
43
+ ## Dataset Summary
44
+ - **Size:** 100,000 Unique Samples
45
+ - **Format:** JSONL
46
+ - **Focus:** Chain-of-Thought (CoT) Reasoning for Web Security
47
+ - **Logic:** Observation -> Hypothesis -> Evidence -> Decision (O-H-E-D)
48
+
49
+ ## Features
50
+ Each sample simulates a complete cognitive process of a Senior Security Analyst:
51
+ 1. **Instruction**: The raw HTTP request + The server's response code/body.
52
+ 2. **Reasoning**: A `
53
+
54
+ <div class="think">` block analyzing the anomaly, evidence, and conclusion.<br />3. **Verdict**: Structured labels for `STATUS`, `SEVERITY`, and `NEXT_TEST`.<br /><br />## Attack Categories<br />The dataset covers a wide spectrum of modern web threats:<br />- **Injection**: SQLi, XSS (Reflected/Stored), Command Injection, LDAPi.<br />- **Business Logic**: Price Manipulation, Mass Assignment, Race Conditions.<br />- **Protocol**: HTTP Request Smuggling, Host Header Injection.<br />- **Anomalies**: Zero-Day simulations (Unknown patterns) and Fuzzing noise.<br />- **Benign**: High-entropy legitimate traffic to train False Positive rejection.<br /><br />## Sample Structure<br />```json<br />{<br /> "instruction": "Analyze: GET /api/v1/user?id=1' OR 1=1 HTTP/1.1...",<br /> "response": "<think>\nObservation: ...\nHypothesis: ...\nEvidence: ...\nDecision: ...\n</div>
55
+
56
+ \nSTATUS: VULNERABLE...",
57
+ "hypothesis": "SQL Injection",
58
+ "confirmed": true,
59
+ "severity": "Critical"
60
+ }