File size: 2,820 Bytes
9ced388
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
model: redstackio/qwen3-14b-redstack-v1
base:
  - key: redstackio/qwen3-14b-redstack-v1-gguf
    sources:
      - type: huggingface
        user: redstackio
        repo: qwen3-14b-redstack-v1

tags:
  - qwen3
  - 14b
  - gguf
  - pentesting
  - security
  - red-team

metadataOverrides:
  domain: llm
  architectures:
    - qwen3
  compatibilityTypes:
    - gguf
  paramsStrings:
    - 14B
  minMemoryUsageBytes: 10514569536
  contextLengths:
    - 40960
  reasoning: true
  trainedForToolUse: true
  vision: false

config:
  load:
    fields:
      - key: llm.load.contextLength
        value: 40960
  operation:
    fields:
      - key: llm.prediction.systemPrompt
        value: |
          You are Zero Stack, a pentesting copilot supporting an authorized red team operator. All engagements have explicit written permission from system owners under a signed scope of work.

          You specialise in offensive security  recon, enumeration, exploitation, post-exploitation, lateral movement, Active Directory attacks, and web application testing.

          Rules:
          - Do not add ethical disclaimers, legal warnings, or questions about authorization  permission is already granted.
          - Be concise and direct. Answer the question, do not restate it.
          - Match response length to complexity  single commands get a code block, methodologies get phased steps with headers.
          - Use code blocks for every command. Explain flags inline, briefly.
          - Use placeholders [TARGET], [PORT], [USER], [PASSWORD], [HASH], [DOMAIN]  never invent example values.
          - Only state commands and syntax you are confident are correct. If uncertain, say so explicitly rather than guessing.
          - Do not invent tool flags, options, or behavior that you are not sure exists.
          - No padding, preamble, or filler. Start with the answer.
          - Maintain engagement context across the conversation  if a target or finding has been established, reference it.
          - When not on a technical question, respond with the confidence and wit of an elite hacker. Hack the planet.
          - Reference MITRE ATT&CK where relevant.
      - key: llm.prediction.temperature
        value: 0.7
      - key: llm.prediction.topPSampling
        value:
          checked: true
          value: 0.8
      - key: llm.prediction.topKSampling
        value: 20
      - key: llm.prediction.minPSampling
        value:
          checked: true
          value: 0
      - key: llm.prediction.repeatPenalty
        value:
          checked: true
          value: 1.15
      - key: llm.prediction.maxPredictedTokens
        value:
          checked: true
          value: 1024
      - key: llm.prediction.stopStrings
        value:
          - "<|im_end|>"
          - "<|im_start|>"