Instructions to use protecttors/sample-files with libraries, inference providers, notebooks, and local apps. Follow these links to get started.
- Libraries
- llama-cpp-python
How to use protecttors/sample-files with llama-cpp-python:
# !pip install llama-cpp-python from llama_cpp import Llama llm = Llama.from_pretrained( repo_id="protecttors/sample-files", filename="gguf_diffusion_model/retr0reg.gguf", )
llm.create_chat_completion( messages = [ { "role": "user", "content": "What is the capital of France?" } ] ) - Notebooks
- Google Colab
- Kaggle
- Local Apps
- llama.cpp
How to use protecttors/sample-files with llama.cpp:
Install from brew
brew install llama.cpp # Start a local OpenAI-compatible server with a web UI: llama-server -hf protecttors/sample-files # Run inference directly in the terminal: llama-cli -hf protecttors/sample-files
Install from WinGet (Windows)
winget install llama.cpp # Start a local OpenAI-compatible server with a web UI: llama-server -hf protecttors/sample-files # Run inference directly in the terminal: llama-cli -hf protecttors/sample-files
Use pre-built binary
# Download pre-built binary from: # https://github.com/ggerganov/llama.cpp/releases # Start a local OpenAI-compatible server with a web UI: ./llama-server -hf protecttors/sample-files # Run inference directly in the terminal: ./llama-cli -hf protecttors/sample-files
Build from source code
git clone https://github.com/ggerganov/llama.cpp.git cd llama.cpp cmake -B build cmake --build build -j --target llama-server llama-cli # Start a local OpenAI-compatible server with a web UI: ./build/bin/llama-server -hf protecttors/sample-files # Run inference directly in the terminal: ./build/bin/llama-cli -hf protecttors/sample-files
Use Docker
docker model run hf.co/protecttors/sample-files
- LM Studio
- Jan
- vLLM
How to use protecttors/sample-files with vLLM:
Install from pip and serve model
# Install vLLM from pip: pip install vllm # Start the vLLM server: vllm serve "protecttors/sample-files" # Call the server using curl (OpenAI-compatible API): curl -X POST "http://localhost:8000/v1/chat/completions" \ -H "Content-Type: application/json" \ --data '{ "model": "protecttors/sample-files", "messages": [ { "role": "user", "content": "What is the capital of France?" } ] }'Use Docker
docker model run hf.co/protecttors/sample-files
- Ollama
How to use protecttors/sample-files with Ollama:
ollama run hf.co/protecttors/sample-files
- Unsloth Studio new
How to use protecttors/sample-files with Unsloth Studio:
Install Unsloth Studio (macOS, Linux, WSL)
curl -fsSL https://unsloth.ai/install.sh | sh # Run unsloth studio unsloth studio -H 0.0.0.0 -p 8888 # Then open http://localhost:8888 in your browser # Search for protecttors/sample-files to start chatting
Install Unsloth Studio (Windows)
irm https://unsloth.ai/install.ps1 | iex # Run unsloth studio unsloth studio -H 0.0.0.0 -p 8888 # Then open http://localhost:8888 in your browser # Search for protecttors/sample-files to start chatting
Using HuggingFace Spaces for Unsloth
# No setup required # Open https://huggingface.co/spaces/unsloth/studio in your browser # Search for protecttors/sample-files to start chatting
- Docker Model Runner
How to use protecttors/sample-files with Docker Model Runner:
docker model run hf.co/protecttors/sample-files
- Lemonade
How to use protecttors/sample-files with Lemonade:
Pull the model
# Download Lemonade from https://lemonade-server.ai/ lemonade pull protecttors/sample-files
Run and chat with the model
lemonade run user.sample-files-{{QUANT_TAG}}List all available models
lemonade list
File size: 10,714 Bytes
ea648ad 07fc7dd ea648ad 07fc7dd c28d071 ea648ad | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 | ---
language:
- en
license: apache-2.0
library_name: gguf
tags:
- conversational
- aibom
- sample
- qwen2
- gguf
pipeline_tag: text-generation
base_model: Qwen/Qwen2-0.5B
---
# Model Card for protecttors/sample-files
`protecttors/sample-files` is a **security vulnerability demonstration repository** containing model artifacts across multiple serialization formats (GGUF, PyTorch `.bin`, and Python pickle `.pkl`). It is NOT a production inference model. It exists to enable AI/ML supply chain security tooling, AIBOM (AI Bill of Materials) generation, unsafe file detection, and red teaming of model ingestion pipelines.
> ⚠️ **Security Notice:** 4 files in this repository are intentionally built to be unsafe. This is by design. Do not load these files into production environments without thorough security review.
---
## Model Details
### Model Description
This repository serves as a controlled artifact fixture for security practitioners and for AIBOM tooling and proffesionals working on AI supply chain integrity. It bundles three classes of model file formats — GGUF (quantized LLM weights), PyTorch binary weights, and pickle-serialized ML objects — to provide ground-truth positive samples for scanners, AIBOM generators, and VEX (Vulnerability Exploitability eXchange) authoring tools.
The `.pkl` and `.bin` files may contain synthetic or deliberately modified artifacts constructed for security research purposes and do not represent validated trained weights.
- **Developed by:** [Protecttors](https://huggingface.co/protecttors)
- **Model type:** GGUF, PKL, PT
- **Language(s) (NLP):** English
- **License:** Apache 2.0
- **Finetuned from model [optional]:** [Qwen/Qwen2-0.5B](https://huggingface.co/Qwen/Qwen2-0.5B)
### Model Sources [optional]
- **Repository:** https://huggingface.co/protecttors/sample-files
- **Paper [optional]:** Not applicable
- **Demo [optional]:** Not applicable
---
## Uses
This repository serves as a controlled artifact fixture for security practitioners and for AIBOM tooling and proffesionals working on AI supply chain integrity.
### Direct Use
This repository is intended for use as a **test artifactory** for:
- **AIBOM/SBOM developer / Integrators** — validating that tools correctly enumerate model components, serialization formats, embedded metadata, and dependency graphs across GGUF, `.bin`, and `.pkl` formats.
- **Vulnerability scanner and testers** — verifying that scanners flag unsafe pickle deserialization payloads, embedded executable code, or malformed model headers.
- **Red teamers and penetration testers** — simulating adversarial model artifacts in controlled environments to test model registry ingestion pipelines, CI/CD gates, and serving infrastructure.
### Downstream Use [optional]
<!-- This section is for the model use when fine-tuned for a task, or when plugged into a larger ecosystem/app -->
Not recommended for any Downstream applications.
### Out-of-Scope Use
<!-- This section addresses misuse, malicious use, and uses that the model will not work well for. -->
- **Production inference:** These files are not quality-evaluated and must not be used for real-world text generation.
- **Fine-tuning or transfer learning:** No training provenance or dataset documentation is available for these artifacts.
- **Weaponization:** Adapting the intentionally unsafe artifacts in this repository to create novel malware or exploit code is strictly prohibited and outside the intended scope of this research.
- **Use by non-security practitioners without supervision:** Users unfamiliar with the risks of loading untrusted `.pkl` or `.bin` files should not interact with these artifacts directly.
---
## Bias, Risks, and Limitations
**Dual-use risk:** Publishing intentionally unsafe model artifacts carries inherent dual-use risk. The same samples that enable defenders to test scanners can, in principle, serve as reference material for adversaries. This is mitigated by ensuring the repository does not contain functional exploits, only detection-oriented samples.
**Pickle deserialization risk:** Python pickle (`.pkl`) files can embed arbitrary executable Python code. Loading these files outside an isolated environment could result in code execution on the host system.
**No quality guarantees on GGUF weights:** The quantized Qwen2 weights have not been evaluated for factual accuracy, coherence, or safety alignment. They inherit any biases present in the Qwen2-0.5B base model.
**Scanner false negative risk:** Not all security scanning tools may flag all 4 unsafe files in this repository. Absence of a scanner alert does not imply safety.
**Format coverage is intentionally narrow:** This repository covers three file formats (GGUF, PyTorch bin, pickle). It does not represent the full surface area of unsafe model formats (e.g., ONNX, SafeTensors, TFLite, CoreML).
### Recommendations
- Always load artifacts from this repository inside an **isolated, sandboxed environment** (container or VM with no network access, no credentials, no access to sensitive filesystem paths).
- Prefer **SafeTensors** over `.pkl` or `.bin` in production pipelines — SafeTensors does not support arbitrary code execution during deserialization.
- Run **pickle scanning** (e.g., `picklescan`, `modelscan`) on any `.pkl` artifact before loading.
- Validate GGUF file headers before inference to detect unexpected metadata or embedded payloads.
- Treat scanner results from this repository as **ground-truth positives** when calibrating detection thresholds.
- Users building AIBOM tooling should verify their tools enumerate all three format directories and correctly surface the 4 flagged files.
---
## How to Get Started with the Model
Use the following **only in an isolated sandbox environment**:
```bash
# Clone the repository
git clone https://huggingface.co/protecttors/sample-files
# Inspect file structure
ls -lh sample-files/gguf_diffusion_model/
ls -lh sample-files/ml_pkl_file/
ls -lh sample-files/torch_bin_model/
# Run pickle scan on pkl artifacts (install: pip install modelscan)
modelscan -p sample-files/ml_pkl_file/
# Inspect GGUF header without loading weights
python -c "
with open('sample-files/gguf_diffusion_model/<file>.gguf', 'rb') as f:
magic = f.read(4)
print('Magic bytes:', magic)
"
```
> Do **not** run `pickle.load()` or `torch.load()` directly on these files outside a sandbox.
---
## Training Details
### Training Data
<!-- This should link to a Dataset Card, perhaps with a short stub of information on what the training data is all about as well as documentation related to data pre-processing or additional filtering. -->
Not applicable. This repository is not the output of a training run.
### Training Procedure
Not applicable.
#### Preprocessing [optional]
Not applicable.
#### Training Hyperparameters
- **Training regime:** Not applicable — no training was performed by the Protecttors organization for this repository.
---
## Evaluation
<!-- This section describes the evaluation protocols and provides the results. -->
### Testing Data, Factors & Metrics
#### Testing Data
This repository is itself a test dataset for security tooling. It is not evaluated on NLP benchmarks.
#### Factors
The relevant evaluation factors for tooling using this repository are:
- **Format coverage:** Does the scanner/AIBOM tool correctly handle all three artifact formats?
- **Detection recall:** Are all 4 unsafe files surfaced by the tool?
- **False positive rate:** Does the tool produce spurious alerts on safe files?
- **Metadata extraction fidelity:** Does the AIBOM tool correctly extract architecture, parameter count, quantization type, and license from GGUF metadata?
#### Metrics
<!-- These are the evaluation metrics being used, ideally with a description of why. -->
| Metric | Description |
|---|---|
| Unsafe file detection rate | % of the 4 flagged files correctly identified |
| Format enumeration completeness | % of artifact formats correctly categorized in AIBOM output |
| VEX advisory linkage | Whether generated VEX documents correctly reference flagged component SHAs |
| False positive rate | Alerts raised on non-flagged files |
### Results
Tooling evaluation results are not included in this card. Security Researchers and practitioners using this repository as a benchmark fixture are encouraged to publish their scanner results via the [Community Discussions tab](https://huggingface.co/protecttors/sample-files/discussions).
#### Summary
This repository provides 4 unsafe artifacts and a mix of format types to stress-test AI supply chain security tooling. It is not benchmarked on NLP tasks.
---
## Model Examination [optional]
The GGUF weights are derived from Qwen2-0.5B, a transformer-based autoregressive language model. No interpretability analysis has been performed by the Protecttors organization on these artifacts. Researchers wishing to inspect model internals may use GGUF header parsing tools to examine quantization metadata without loading full weights into memory.
---
## Environmental Impact
No training was conducted by the Protecttors for this repository.
The GGUF quantization of Qwen2-0.5B is a lightweight conversion step with negligible carbon footprint relative to the original pre-training.
- **Hardware Type:** Not applicable (no training by Protecttors)
- **Hours used:** Not applicable
- **Cloud Provider:** Not applicable
- **Compute Region:** Not applicable
- **Carbon Emitted:** Not applicable — refer to [Qwen2 model card](https://huggingface.co/Qwen/Qwen2-0.5B) for pre-training emissions
---
## Technical Specifications [optional]
### Model Architecture and Objective
| Property | Value |
|---|---|
| Architecture | Qwen2 (transformer, autoregressive) |
| Parameters | ~0.6B |
| Primary serialization format | GGUF (quantized) |
| Additional formats | PyTorch `.bin`, Python `.pkl` |
| Chat template | Qwen2 default |
| Quantization variants | See repository file listing |
### Compute Infrastructure
Not applicable — no training infrastructure was used by the Protecttors organization.
#### Hardware
Not applicable.
#### Software
- GGUF conversion: `llama.cpp` conversion toolchain
- Pickle artifacts: Python 3.x standard library
- PyTorch Package
### Framework versions
- Transformers 4.28.1
- Pytorch 2.0.0+cu118
- Datasets 2.11.0
- Tokenizers 0.13.3
- Tensorflow 2.19.1
- tensorflow-gpu 2.10.1
## Model Card Contact
Reach out via the [Community Discussions tab](https://huggingface.co/protecttors/sample-files/discussions) on this repository for questions, responsible disclosure, or tooling benchmark contributions.
|