jayansh21 commited on
Commit
876154b
·
verified ·
1 Parent(s): 631aeca

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +114 -164
README.md CHANGED
@@ -1,199 +1,149 @@
1
  ---
 
 
2
  library_name: transformers
3
- tags: []
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
4
  ---
5
 
6
- # Model Card for Model ID
7
 
8
- <!-- Provide a quick summary of what the model is/does. -->
9
 
 
10
 
 
11
 
12
- ## Model Details
 
 
 
13
 
14
- ### Model Description
15
 
16
- <!-- Provide a longer summary of what this model is. -->
 
 
17
 
18
- This is the model card of a 🤗 transformers model that has been pushed on the Hub. This model card has been automatically generated.
19
 
20
- - **Developed by:** [More Information Needed]
21
- - **Funded by [optional]:** [More Information Needed]
22
- - **Shared by [optional]:** [More Information Needed]
23
- - **Model type:** [More Information Needed]
24
- - **Language(s) (NLP):** [More Information Needed]
25
- - **License:** [More Information Needed]
26
- - **Finetuned from model [optional]:** [More Information Needed]
27
 
28
- ### Model Sources [optional]
29
 
30
- <!-- Provide the basic links for the model. -->
31
 
32
- - **Repository:** [More Information Needed]
33
- - **Paper [optional]:** [More Information Needed]
34
- - **Demo [optional]:** [More Information Needed]
 
35
 
36
- ## Uses
37
 
38
- <!-- Address questions around how the model is intended to be used, including the foreseeable users of the model and those affected by the model. -->
 
 
 
 
 
 
 
 
 
 
 
 
39
 
40
- ### Direct Use
41
 
42
- <!-- This section is for the model use without fine-tuning or plugging into a larger ecosystem/app. -->
43
-
44
- [More Information Needed]
45
-
46
- ### Downstream Use [optional]
47
-
48
- <!-- This section is for the model use when fine-tuned for a task, or when plugged into a larger ecosystem/app -->
49
-
50
- [More Information Needed]
51
-
52
- ### Out-of-Scope Use
53
-
54
- <!-- This section addresses misuse, malicious use, and uses that the model will not work well for. -->
55
-
56
- [More Information Needed]
57
-
58
- ## Bias, Risks, and Limitations
59
-
60
- <!-- This section is meant to convey both technical and sociotechnical limitations. -->
61
-
62
- [More Information Needed]
63
-
64
- ### Recommendations
65
-
66
- <!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
67
-
68
- Users (both direct and downstream) should be made aware of the risks, biases and limitations of the model. More information needed for further recommendations.
69
-
70
- ## How to Get Started with the Model
71
-
72
- Use the code below to get started with the model.
73
-
74
- [More Information Needed]
75
-
76
- ## Training Details
77
-
78
- ### Training Data
79
-
80
- <!-- This should link to a Dataset Card, perhaps with a short stub of information on what the training data is all about as well as documentation related to data pre-processing or additional filtering. -->
81
-
82
- [More Information Needed]
83
-
84
- ### Training Procedure
85
-
86
- <!-- This relates heavily to the Technical Specifications. Content here should link to that section when it is relevant to the training procedure. -->
87
-
88
- #### Preprocessing [optional]
89
-
90
- [More Information Needed]
91
-
92
-
93
- #### Training Hyperparameters
94
-
95
- - **Training regime:** [More Information Needed] <!--fp32, fp16 mixed precision, bf16 mixed precision, bf16 non-mixed precision, fp16 non-mixed precision, fp8 mixed precision -->
96
-
97
- #### Speeds, Sizes, Times [optional]
98
-
99
- <!-- This section provides information about throughput, start/end time, checkpoint size if relevant, etc. -->
100
-
101
- [More Information Needed]
102
 
103
  ## Evaluation
104
 
105
- <!-- This section describes the evaluation protocols and provides the results. -->
106
-
107
- ### Testing Data, Factors & Metrics
108
-
109
- #### Testing Data
110
-
111
- <!-- This should link to a Dataset Card if possible. -->
112
-
113
- [More Information Needed]
114
-
115
- #### Factors
116
-
117
- <!-- These are the things the evaluation is disaggregating by, e.g., subpopulations or domains. -->
118
-
119
- [More Information Needed]
120
-
121
- #### Metrics
122
-
123
- <!-- These are the evaluation metrics being used, ideally with a description of why. -->
124
-
125
- [More Information Needed]
126
-
127
- ### Results
128
-
129
- [More Information Needed]
130
-
131
- #### Summary
132
-
133
-
134
-
135
- ## Model Examination [optional]
136
-
137
- <!-- Relevant interpretability work for the model goes here -->
138
-
139
- [More Information Needed]
140
-
141
- ## Environmental Impact
142
-
143
- <!-- Total emissions (in grams of CO2eq) and additional considerations, such as electricity usage, go here. Edit the suggested text below accordingly -->
144
-
145
- Carbon emissions can be estimated using the [Machine Learning Impact calculator](https://mlco2.github.io/impact#compute) presented in [Lacoste et al. (2019)](https://arxiv.org/abs/1910.09700).
146
-
147
- - **Hardware Type:** [More Information Needed]
148
- - **Hours used:** [More Information Needed]
149
- - **Cloud Provider:** [More Information Needed]
150
- - **Compute Region:** [More Information Needed]
151
- - **Carbon Emitted:** [More Information Needed]
152
-
153
- ## Technical Specifications [optional]
154
-
155
- ### Model Architecture and Objective
156
-
157
- [More Information Needed]
158
-
159
- ### Compute Infrastructure
160
-
161
- [More Information Needed]
162
-
163
- #### Hardware
164
-
165
- [More Information Needed]
166
-
167
- #### Software
168
-
169
- [More Information Needed]
170
-
171
- ## Citation [optional]
172
-
173
- <!-- If there is a paper or blog post introducing the model, the APA and Bibtex information for that should go in this section. -->
174
 
175
- **BibTeX:**
 
 
 
176
 
177
- [More Information Needed]
178
 
179
- **APA:**
 
 
 
 
 
 
180
 
181
- [More Information Needed]
182
 
183
- ## Glossary [optional]
184
 
185
- <!-- If relevant, include terms and calculations in this section that can help readers understand the model or model card. -->
186
 
187
- [More Information Needed]
188
 
189
- ## More Information [optional]
190
 
191
- [More Information Needed]
 
 
192
 
193
- ## Model Card Authors [optional]
 
 
194
 
195
- [More Information Needed]
 
 
 
 
196
 
197
- ## Model Card Contact
 
 
198
 
199
- [More Information Needed]
 
 
 
 
 
1
  ---
2
+ language:
3
+ - code
4
  library_name: transformers
5
+ pipeline_tag: text-classification
6
+ tags:
7
+ - code-review
8
+ - bug-detection
9
+ - codebert
10
+ - python
11
+ - security
12
+ - static-analysis
13
+ datasets:
14
+ - code_search_net
15
+ base_model: microsoft/codebert-base
16
+ metrics:
17
+ - f1
18
+ - accuracy
19
+ - precision
20
+ - recall
21
+ model-index:
22
+ - name: codesheriff-bug-classifier
23
+ results:
24
+ - task:
25
+ type: text-classification
26
+ name: Code Bug Classification
27
+ dataset:
28
+ type: code_search_net
29
+ name: CodeSearchNet (Python split)
30
+ config: python
31
+ metrics:
32
+ - type: f1
33
+ value: 0.89
34
+ name: Macro F1
35
  ---
36
 
37
+ # 🛡️ CodeSheriff Bug Classifier
38
 
39
+ A fine-tuned **CodeBERT** model for automatic code bug classification in Python source code. Classifies code snippets into 5 categories to power AI-driven pull request reviews.
40
 
41
+ ## Model Description
42
 
43
+ CodeSheriff Bug Classifier is a multi-class text classification model built on top of [microsoft/codebert-base](https://huggingface.co/microsoft/codebert-base). It takes a Python code snippet as input and predicts the type of bug present (or classifies it as clean).
44
 
45
+ - **Base model:** `microsoft/codebert-base` (125M parameters)
46
+ - **Task:** Multi-class code classification (5 classes)
47
+ - **Language:** Python
48
+ - **Framework:** PyTorch + HuggingFace Transformers
49
 
50
+ ## Intended Uses
51
 
52
+ - **Primary use:** Backend classifier for the [CodeSheriff](https://github.com/jayansh21/CodeSheriff) automated PR review system.
53
+ - **General use:** Any system that needs to classify Python code snippets for potential bugs (security vulnerabilities, null references, type mismatches, logic flaws).
54
+ - **Out of scope:** This model is not designed for non-Python languages, natural language text, or code generation.
55
 
56
+ ## Labels
57
 
58
+ | ID | Label | Description |
59
+ |----|------------------------|--------------------------------------------------|
60
+ | 0 | Clean | Well-formed code with no detected issues |
61
+ | 1 | Null Reference Risk | Potential `NoneType` access without null checks |
62
+ | 2 | Type Mismatch | Incompatible type operations (e.g., `str + int`) |
63
+ | 3 | Security Vulnerability | SQL injection, command injection, `eval()`, etc. |
64
+ | 4 | Logic Flaw | Off-by-one errors, division by zero, wrong logic |
65
 
66
+ ## Training
67
 
68
+ ### Dataset
69
 
70
+ - **Source:** [CodeSearchNet](https://huggingface.co/datasets/code_search_net) (Python split)
71
+ - **Labelling:** Heuristic rules applied to raw functions, augmented with 5,600 hand-crafted seed examples across all 5 classes (Clean: 3,000, Null Reference: 800, Type Mismatch: 500, Security: 500, Logic Flaw: 800)
72
+ - **Preprocessing:** Function-level tokenization, max sequence length 512 tokens
73
+ - **Split:** 80% train / 10% validation / 10% test (stratified, seed=42)
74
 
75
+ ### Hyperparameters
76
 
77
+ | Parameter | Value |
78
+ |----------------------------|---------|
79
+ | Base model | `microsoft/codebert-base` |
80
+ | Max token length | 512 |
81
+ | Batch size | 8 |
82
+ | Gradient accumulation steps| 2 |
83
+ | Effective batch size | 16 |
84
+ | Learning rate | 2e-5 |
85
+ | Epochs | 4 |
86
+ | Optimizer | AdamW |
87
+ | Scheduler | Linear warmup + decay |
88
+ | Weight decay | 0.01 |
89
+ | Seed | 42 |
90
 
91
+ ### Training Infrastructure
92
 
93
+ - **GPU:** NVIDIA RTX 3050 (4GB VRAM)
94
+ - **Python:** 3.11.9
95
+ - **PyTorch:** 2.x with CUDA
96
+ - **Transformers:** 4.35+
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
97
 
98
  ## Evaluation
99
 
100
+ ### Metrics (Test Set)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
101
 
102
+ | Metric | Score |
103
+ |-----------|-------|
104
+ | **Macro F1** | **0.89** |
105
+ | Accuracy | 0.91 |
106
 
107
+ ### Per-Class Performance
108
 
109
+ | Label | Precision | Recall | F1-Score |
110
+ |------------------------|-----------|--------|----------|
111
+ | Clean | 0.92 | 0.95 | 0.93 |
112
+ | Null Reference Risk | 0.85 | 0.82 | 0.83 |
113
+ | Type Mismatch | 0.84 | 0.80 | 0.82 |
114
+ | Security Vulnerability | 0.96 | 0.98 | 0.97 |
115
+ | Logic Flaw | 0.87 | 0.86 | 0.87 |
116
 
117
+ > Security Vulnerability achieves the highest F1 due to strong lexical signals (`os.system`, `eval`, SQL concatenation).
118
 
119
+ ## Confidence Gate
120
 
121
+ In production, predictions below **60% confidence** are automatically downgraded to "Code Quality" (a generic low-priority label) to reduce false positives. Multi-label probabilities (`all_probs`) are also returned for downstream use.
122
 
123
+ ## How to Use
124
 
125
+ ### With Transformers
126
 
127
+ ```python
128
+ from transformers import AutoTokenizer, AutoModelForSequenceClassification
129
+ import torch
130
 
131
+ model_name = "jayansh21/codesheriff-bug-classifier"
132
+ tokenizer = AutoTokenizer.from_pretrained(model_name)
133
+ model = AutoModelForSequenceClassification.from_pretrained(model_name)
134
 
135
+ code = """
136
+ def get_user(uid):
137
+ query = "SELECT * FROM users WHERE id=" + uid
138
+ return db.execute(query)
139
+ """
140
 
141
+ inputs = tokenizer(code, return_tensors="pt", truncation=True, max_length=512)
142
+ with torch.no_grad():
143
+ logits = model(**inputs).logits
144
 
145
+ predicted_class = logits.argmax(dim=-1).item()
146
+ labels = {0: "Clean", 1: "Null Reference Risk", 2: "Type Mismatch",
147
+ 3: "Security Vulnerability", 4: "Logic Flaw"}
148
+ print(f"Prediction: {labels[predicted_class]}")
149
+ # Output: Prediction: Security Vulnerability