jason-oneal commited on
Commit
9695c48
·
verified ·
1 Parent(s): 66f8510

High-entropy eval-driven behavioral fixes

Browse files
README.md CHANGED
@@ -1,127 +1,209 @@
1
  ---
2
- license: apache-2.0
3
  library_name: peft
4
  pipeline_tag: text-generation
5
- base_model: p-e-w/gpt-oss-20b-heretic
6
  tags:
7
- - cybersecurity
8
- - penetration-testing
9
- - red-team
10
- - orchestration
11
  - lora
12
  - sft
13
  - transformers
14
  - trl
15
- - security-ai
16
- - secgpt
17
- language:
18
- - en
19
  ---
20
 
21
- # secgpt-base-lora
22
 
23
- ## Model Summary
24
 
25
- **secgpt-base-lora** is a LoRA fine-tune created to transform a permissive large language model into a **cybersecurity orchestration engine**.
26
 
27
- The model is designed to plan, reason, and structure penetration testing workflows while enforcing scope, constraints, and rules of engagement. It does **not** perform exploitation, scanning, or live attacks.
28
 
29
- This model serves as the **base orchestrator** for the SecGPT project and is intended to be embedded inside controlled agent frameworks.
30
 
31
- ## Base Model
32
 
33
- - **Base model:** `p-e-w/gpt-oss-20b-heretic`
34
- - **Original lineage:** `openai/gpt-oss-20b`
35
- - **Architecture:** Decoder-only transformer (MoE-based, inherited)
36
- - **Fine-tuning method:** LoRA (Low-Rank Adaptation)
37
- - **Precision:** BF16 compatible
38
- - **Author:** Jason O’Neal
39
 
40
- The Heretic base model was chosen specifically for its reduced refusal behavior, allowing orchestration logic to be learned without fighting upstream safety refusals.
41
 
42
- ## Intended Use
43
 
44
- ### Primary Purpose
45
- - Penetration testing orchestration
46
- - Red team workflow planning
47
- - Tool selection and sequencing
48
- - Scope and constraint enforcement
49
- - Structured, machine-readable output generation
 
50
 
51
- ### Example Tasks
52
- - Plan non-destructive external assessments
53
- - Select appropriate tools based on scope and target type
54
- - Generate ordered testing workflows
55
- - Produce strict JSON plans for downstream agents
56
- - Refuse out-of-scope or unsafe requests
57
 
58
- ### Explicitly Out of Scope
59
- - Autonomous exploitation
60
- - Payload generation
61
- - Malware development
62
- - Live attack execution
63
- - Social engineering automation
64
 
65
- This model plans. Execution belongs elsewhere.
 
 
66
 
67
- ## Training Data
68
 
69
- The model was fine-tuned on a **custom, hand-curated cybersecurity orchestration dataset**, including:
70
 
71
- - Penetration testing plans
72
- - Tool-centric workflows with explicit arguments
73
- - Scope, ROE, and constraint handling
74
- - Failure handling and recovery scenarios
75
- - Structured JSON outputs validated against schemas
76
 
77
- No proprietary data, real credentials, or live targets were used.
78
 
79
- ## Output Format
80
 
81
- The model strongly prefers **strict JSON outputs**.
82
 
83
- Typical responses include:
84
- - Objectives
85
- - Constraints
86
- - Ordered steps
87
- - Tool names and arguments
88
- - Expected outcomes
89
 
90
- Unstructured or conversational output is intentionally discouraged.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
91
 
92
  ## Evaluation
93
 
94
- Evaluation focuses on **behavioral correctness**, not stylistic quality:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
95
 
96
- - Tool selection accuracy
97
- - Argument validity
98
- - JSON schema compliance
99
- - Scope enforcement
100
- - Proper refusal behavior
101
- - Recovery after simulated tool failure
102
 
103
- Hallucinated tools, invented results, or fabricated flags are treated as failures.
104
 
105
- ## Limitations
106
 
107
- - Does not execute tools or commands
108
- - Depends on the host framework for enforcement
109
- - Can hallucinate if misused or prompted incorrectly
110
- - Not a replacement for human judgment
111
- - Requires external validation and guardrails
112
 
113
- This is an orchestrator, not an autopwn engine.
114
 
115
- ## Ethical Considerations
116
 
117
- This model is intended solely for **authorized security testing and defensive research**.
118
 
119
- Users are responsible for ensuring compliance with applicable laws, contracts, and rules of engagement. Misuse reflects on the user, not the model.
120
 
121
- ## License
122
 
123
- Apache License 2.0
124
 
125
- ## Acknowledgments
 
126
 
127
- Developed as part of the **SecGPT** project, focused on building modular, auditable, and controllable AI-assisted security tooling.
 
1
  ---
2
+ base_model: jason-oneal/secgpt-base
3
  library_name: peft
4
  pipeline_tag: text-generation
 
5
  tags:
6
+ - base_model:adapter:jason-oneal/secgpt-base
 
 
 
7
  - lora
8
  - sft
9
  - transformers
10
  - trl
 
 
 
 
11
  ---
12
 
13
+ # Model Card for Model ID
14
 
15
+ <!-- Provide a quick summary of what the model is/does. -->
16
 
 
17
 
 
18
 
19
+ ## Model Details
20
 
21
+ ### Model Description
22
 
23
+ <!-- Provide a longer summary of what this model is. -->
 
 
 
 
 
24
 
 
25
 
 
26
 
27
+ - **Developed by:** [More Information Needed]
28
+ - **Funded by [optional]:** [More Information Needed]
29
+ - **Shared by [optional]:** [More Information Needed]
30
+ - **Model type:** [More Information Needed]
31
+ - **Language(s) (NLP):** [More Information Needed]
32
+ - **License:** [More Information Needed]
33
+ - **Finetuned from model [optional]:** [More Information Needed]
34
 
35
+ ### Model Sources [optional]
 
 
 
 
 
36
 
37
+ <!-- Provide the basic links for the model. -->
 
 
 
 
 
38
 
39
+ - **Repository:** [More Information Needed]
40
+ - **Paper [optional]:** [More Information Needed]
41
+ - **Demo [optional]:** [More Information Needed]
42
 
43
+ ## Uses
44
 
45
+ <!-- Address questions around how the model is intended to be used, including the foreseeable users of the model and those affected by the model. -->
46
 
47
+ ### Direct Use
 
 
 
 
48
 
49
+ <!-- This section is for the model use without fine-tuning or plugging into a larger ecosystem/app. -->
50
 
51
+ [More Information Needed]
52
 
53
+ ### Downstream Use [optional]
54
 
55
+ <!-- This section is for the model use when fine-tuned for a task, or when plugged into a larger ecosystem/app -->
 
 
 
 
 
56
 
57
+ [More Information Needed]
58
+
59
+ ### Out-of-Scope Use
60
+
61
+ <!-- This section addresses misuse, malicious use, and uses that the model will not work well for. -->
62
+
63
+ [More Information Needed]
64
+
65
+ ## Bias, Risks, and Limitations
66
+
67
+ <!-- This section is meant to convey both technical and sociotechnical limitations. -->
68
+
69
+ [More Information Needed]
70
+
71
+ ### Recommendations
72
+
73
+ <!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
74
+
75
+ Users (both direct and downstream) should be made aware of the risks, biases and limitations of the model. More information needed for further recommendations.
76
+
77
+ ## How to Get Started with the Model
78
+
79
+ Use the code below to get started with the model.
80
+
81
+ [More Information Needed]
82
+
83
+ ## Training Details
84
+
85
+ ### Training Data
86
+
87
+ <!-- This should link to a Dataset Card, perhaps with a short stub of information on what the training data is all about as well as documentation related to data pre-processing or additional filtering. -->
88
+
89
+ [More Information Needed]
90
+
91
+ ### Training Procedure
92
+
93
+ <!-- This relates heavily to the Technical Specifications. Content here should link to that section when it is relevant to the training procedure. -->
94
+
95
+ #### Preprocessing [optional]
96
+
97
+ [More Information Needed]
98
+
99
+
100
+ #### Training Hyperparameters
101
+
102
+ - **Training regime:** [More Information Needed] <!--fp32, fp16 mixed precision, bf16 mixed precision, bf16 non-mixed precision, fp16 non-mixed precision, fp8 mixed precision -->
103
+
104
+ #### Speeds, Sizes, Times [optional]
105
+
106
+ <!-- This section provides information about throughput, start/end time, checkpoint size if relevant, etc. -->
107
+
108
+ [More Information Needed]
109
 
110
  ## Evaluation
111
 
112
+ <!-- This section describes the evaluation protocols and provides the results. -->
113
+
114
+ ### Testing Data, Factors & Metrics
115
+
116
+ #### Testing Data
117
+
118
+ <!-- This should link to a Dataset Card if possible. -->
119
+
120
+ [More Information Needed]
121
+
122
+ #### Factors
123
+
124
+ <!-- These are the things the evaluation is disaggregating by, e.g., subpopulations or domains. -->
125
+
126
+ [More Information Needed]
127
+
128
+ #### Metrics
129
+
130
+ <!-- These are the evaluation metrics being used, ideally with a description of why. -->
131
+
132
+ [More Information Needed]
133
+
134
+ ### Results
135
+
136
+ [More Information Needed]
137
+
138
+ #### Summary
139
+
140
+
141
+
142
+ ## Model Examination [optional]
143
+
144
+ <!-- Relevant interpretability work for the model goes here -->
145
+
146
+ [More Information Needed]
147
+
148
+ ## Environmental Impact
149
+
150
+ <!-- Total emissions (in grams of CO2eq) and additional considerations, such as electricity usage, go here. Edit the suggested text below accordingly -->
151
+
152
+ Carbon emissions can be estimated using the [Machine Learning Impact calculator](https://mlco2.github.io/impact#compute) presented in [Lacoste et al. (2019)](https://arxiv.org/abs/1910.09700).
153
+
154
+ - **Hardware Type:** [More Information Needed]
155
+ - **Hours used:** [More Information Needed]
156
+ - **Cloud Provider:** [More Information Needed]
157
+ - **Compute Region:** [More Information Needed]
158
+ - **Carbon Emitted:** [More Information Needed]
159
+
160
+ ## Technical Specifications [optional]
161
+
162
+ ### Model Architecture and Objective
163
+
164
+ [More Information Needed]
165
+
166
+ ### Compute Infrastructure
167
+
168
+ [More Information Needed]
169
+
170
+ #### Hardware
171
+
172
+ [More Information Needed]
173
+
174
+ #### Software
175
+
176
+ [More Information Needed]
177
+
178
+ ## Citation [optional]
179
+
180
+ <!-- If there is a paper or blog post introducing the model, the APA and Bibtex information for that should go in this section. -->
181
+
182
+ **BibTeX:**
183
+
184
+ [More Information Needed]
185
 
186
+ **APA:**
 
 
 
 
 
187
 
188
+ [More Information Needed]
189
 
190
+ ## Glossary [optional]
191
 
192
+ <!-- If relevant, include terms and calculations in this section that can help readers understand the model or model card. -->
 
 
 
 
193
 
194
+ [More Information Needed]
195
 
196
+ ## More Information [optional]
197
 
198
+ [More Information Needed]
199
 
200
+ ## Model Card Authors [optional]
201
 
202
+ [More Information Needed]
203
 
204
+ ## Model Card Contact
205
 
206
+ [More Information Needed]
207
+ ### Framework versions
208
 
209
+ - PEFT 0.18.0
adapter_config.json CHANGED
@@ -3,7 +3,7 @@
3
  "alpha_pattern": {},
4
  "arrow_config": null,
5
  "auto_mapping": null,
6
- "base_model_name_or_path": "p-e-w/gpt-oss-20b-heretic",
7
  "bias": "none",
8
  "corda_config": null,
9
  "ensure_weight_tying": false,
@@ -16,7 +16,7 @@
16
  "layers_pattern": null,
17
  "layers_to_transform": null,
18
  "loftq_config": {},
19
- "lora_alpha": 32,
20
  "lora_bias": false,
21
  "lora_dropout": 0.05,
22
  "megatron_config": null,
@@ -25,13 +25,13 @@
25
  "peft_type": "LORA",
26
  "peft_version": "0.18.0",
27
  "qalora_group_size": 16,
28
- "r": 16,
29
  "rank_pattern": {},
30
  "revision": null,
31
  "target_modules": [
 
32
  "q_proj",
33
  "k_proj",
34
- "v_proj",
35
  "o_proj"
36
  ],
37
  "target_parameters": null,
 
3
  "alpha_pattern": {},
4
  "arrow_config": null,
5
  "auto_mapping": null,
6
+ "base_model_name_or_path": "jason-oneal/secgpt-base",
7
  "bias": "none",
8
  "corda_config": null,
9
  "ensure_weight_tying": false,
 
16
  "layers_pattern": null,
17
  "layers_to_transform": null,
18
  "loftq_config": {},
19
+ "lora_alpha": 16,
20
  "lora_bias": false,
21
  "lora_dropout": 0.05,
22
  "megatron_config": null,
 
25
  "peft_type": "LORA",
26
  "peft_version": "0.18.0",
27
  "qalora_group_size": 16,
28
+ "r": 8,
29
  "rank_pattern": {},
30
  "revision": null,
31
  "target_modules": [
32
+ "v_proj",
33
  "q_proj",
34
  "k_proj",
 
35
  "o_proj"
36
  ],
37
  "target_parameters": null,
adapter_model.safetensors CHANGED
@@ -1,3 +1,3 @@
1
  version https://git-lfs.github.com/spec/v1
2
- oid sha256:3ee11d5dab0e7debba1bd2fd826a2e23a96c48544643cd5c8ef0e233cfb5dcb1
3
- size 31876192
 
1
  version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c498b4e8fb278698671f19594ab549bfd2620416cb800972b41496b486c97eaf
3
+ size 15950616
tokenizer_config.json CHANGED
@@ -177,7 +177,7 @@
177
  "input_ids",
178
  "attention_mask"
179
  ],
180
- "model_max_length": 1000000000000000019884624838656,
181
  "pad_token": "<|endoftext|>",
182
  "tokenizer_class": "PreTrainedTokenizerFast"
183
  }
 
177
  "input_ids",
178
  "attention_mask"
179
  ],
180
+ "model_max_length": 4096,
181
  "pad_token": "<|endoftext|>",
182
  "tokenizer_class": "PreTrainedTokenizerFast"
183
  }
training_args.bin CHANGED
@@ -1,3 +1,3 @@
1
  version https://git-lfs.github.com/spec/v1
2
- oid sha256:2ffff40273a4a1acc3c9f885404a2c912b254724ed5d8785071d56094c8a357c
3
  size 6225
 
1
  version https://git-lfs.github.com/spec/v1
2
+ oid sha256:422479637fb8c332ab8749a8b55f860012018e866f6f809a8fb4d3f4d95124f0
3
  size 6225