S-Dreamer commited on
Commit
ea53385
Β·
verified Β·
1 Parent(s): 7422a5c

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +95 -55
README.md CHANGED
@@ -1,35 +1,45 @@
1
  ---
2
  title: Purple Team Code Workbench
3
- emoji: πŸ‘€
 
 
4
  colorFrom: purple
5
  colorTo: indigo
 
6
  sdk: streamlit
7
  sdk_version: 1.57.0
8
- python_version: '3.11'
 
 
9
  app_file: app.py
 
10
  pinned: true
 
11
  license: apache-2.0
12
- short_description: |
13
- AI workbench for purple-team security workflows.
 
14
  tags:
15
- - cybersecurity
16
- - purple-team
17
- - defensive-security
18
- - ai-security
19
- - code-generation
20
- - streamlit
21
- - llm
22
- - red-team
23
- - blue-team
24
- - security-research
25
- - transformers
26
- - generative-ai
27
  models:
28
- - DeepHat/DeepHat-V1-7B
29
- - HauhauCS/Gemma-4-E4B-Uncensored-HauhauCS-Aggressive
30
- - meta-llama/Meta-Llama-3-8B-Instruct
 
31
  suggested_hardware: cpu-upgrade
32
  suggested_storage: small
 
33
  thumbnail: >-
34
  https://cdn-uploads.huggingface.co/production/uploads/67c714e90b99a2332e310979/L02-prFfHa7eBZGVf4uvR.jpeg
35
  ---
@@ -69,6 +79,23 @@ The system is intentionally structured around controlled workflows rather than u
69
 
70
  ---
71
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
72
  ## Safety & Intended Use
73
 
74
  Purple Team Code Workbench is intended for:
@@ -89,7 +116,7 @@ Users are responsible for complying with applicable laws, organizational policie
89
 
90
  | Model | Purpose |
91
  |---|---|
92
- | Gemma-4-E4B-Uncensored | Creative adversarial ideation and unrestricted experimentation |
93
  | DeepHat-V1-7B | Security-oriented coding and workflow assistance |
94
  | Llama 3 8B Instruct | General reasoning and structured instruction following |
95
 
@@ -164,15 +191,15 @@ A tragically rare design choice in 2026.
164
 
165
  ### Planned Capabilities
166
 
167
- - Agent orchestration
168
- - Prompt chaining
169
  - Workflow templates
 
 
170
  - Typed finding schemas
 
 
171
  - Evidence graphing
172
  - Drift-aware execution state
173
- - Multi-provider inference routing
174
  - Report diff/version tracking
175
- - Local LLM runtime support
176
  - LangGraph integration
177
  - MCP-compatible tool surfaces
178
 
@@ -194,7 +221,18 @@ Model availability depends on provider access and deployment configuration.
194
 
195
  ## Repository Structure
196
 
197
- text . β”œβ”€β”€ app.py β”œβ”€β”€ requirements.txt β”œβ”€β”€ README.md β”œβ”€β”€ assets/ β”œβ”€β”€ workflows/ β”œβ”€β”€ prompts/ β”œβ”€β”€ reports/ β”œβ”€β”€ utils/ └── components/
 
 
 
 
 
 
 
 
 
 
 
198
 
199
  Recommended modularization:
200
 
@@ -215,29 +253,42 @@ Recommended modularization:
215
 
216
  Clone the repository:
217
 
218
- bash git clone https://github.com/your-org/purple-team-code-workbench.git cd purple-team-code-workbench
 
 
 
219
 
220
  Create a virtual environment:
221
 
222
- bash python -m venv .venv
 
 
223
 
224
  Activate the environment:
225
 
226
  #### Linux/macOS
227
 
228
- bash source .venv/bin/activate
 
 
229
 
230
  #### Windows
231
 
232
- powershell .venv\Scripts\activate
 
 
233
 
234
  Install dependencies:
235
 
236
- bash pip install -r requirements.txt
 
 
237
 
238
  Run the application:
239
 
240
- bash streamlit run app.py
 
 
241
 
242
  ---
243
 
@@ -252,33 +303,20 @@ This repository is compatible with:
252
 
253
  Example metadata:
254
 
255
- yaml sdk: streamlit sdk_version: 1.57.0 app_file: app.py license: apache-2.0
256
-
 
257
  ---
258
 
259
- ## Security Philosophy
260
-
261
- This project is intended for:
262
-
263
- - authorized testing
264
- - defensive research
265
- - purple-team simulation
266
- - workflow engineering
267
- - educational environments
268
- - internal security operations
269
-
270
- This repository is not intended for:
271
-
272
- - unauthorized access
273
- - destructive automation
274
- - malware deployment
275
- - credential theft
276
- - persistence tooling
277
- - uncontrolled exploitation
278
 
279
- Users are responsible for complying with all applicable laws and authorization requirements.
280
 
281
- Tiny administrative detail. Society gets strangely emotional about β€œcybercrime.”
 
 
 
 
282
 
283
  ---
284
 
@@ -299,7 +337,9 @@ If deploying in production environments:
299
 
300
  ## Example Workflow
301
 
302
- text Scope Definition ↓ Passive Recon ↓ Evidence Collection ↓ Finding Classification ↓ Code/Prompt Generation ↓ Human Validation ↓ Report Export
 
 
303
 
304
  ---
305
 
 
1
  ---
2
  title: Purple Team Code Workbench
3
+
4
+ emoji: πŸ›‘οΈ
5
+
6
  colorFrom: purple
7
  colorTo: indigo
8
+
9
  sdk: streamlit
10
  sdk_version: 1.57.0
11
+
12
+ python_version: "3.11"
13
+
14
  app_file: app.py
15
+
16
  pinned: true
17
+
18
  license: apache-2.0
19
+
20
+ short_description: AI workbench for purple-team security workflows.
21
+
22
  tags:
23
+ - cybersecurity
24
+ - purple-team
25
+ - defensive-security
26
+ - ai-security
27
+ - streamlit
28
+ - llm
29
+ - red-team
30
+ - blue-team
31
+ - security-research
32
+ - transformers
33
+ - generative-ai
34
+
35
  models:
36
+ - DeepHat/DeepHat-V1-7B
37
+ - HauhauCS/Gemma-4-E4B-Uncensored-HauhauCS-Aggressive
38
+ - meta-llama/Meta-Llama-3-8B-Instruct
39
+
40
  suggested_hardware: cpu-upgrade
41
  suggested_storage: small
42
+
43
  thumbnail: >-
44
  https://cdn-uploads.huggingface.co/production/uploads/67c714e90b99a2332e310979/L02-prFfHa7eBZGVf4uvR.jpeg
45
  ---
 
79
 
80
  ---
81
 
82
+ ## Why Purple Team?
83
+
84
+ Purple-team methodology combines offensive security simulation with defensive validation and detection engineering.
85
+
86
+ This workbench is designed to support collaborative workflows between:
87
+
88
+ - security researchers
89
+ - defenders
90
+ - detection engineers
91
+ - SOC analysts
92
+ - incident responders
93
+ - application security teams
94
+
95
+ The focus is operational learning, validation, and resilience improvement rather than isolated offensive capability.
96
+
97
+ ---
98
+
99
  ## Safety & Intended Use
100
 
101
  Purple Team Code Workbench is intended for:
 
116
 
117
  | Model | Purpose |
118
  |---|---|
119
+ | Gemma-4-E4B-Uncensored | Experimental reasoning and adversarial simulation support |
120
  | DeepHat-V1-7B | Security-oriented coding and workflow assistance |
121
  | Llama 3 8B Instruct | General reasoning and structured instruction following |
122
 
 
191
 
192
  ### Planned Capabilities
193
 
 
 
194
  - Workflow templates
195
+ - Prompt chaining
196
+ - Agent orchestration
197
  - Typed finding schemas
198
+ - Multi-provider inference routing
199
+ - Local LLM runtime support
200
  - Evidence graphing
201
  - Drift-aware execution state
 
202
  - Report diff/version tracking
 
203
  - LangGraph integration
204
  - MCP-compatible tool surfaces
205
 
 
221
 
222
  ## Repository Structure
223
 
224
+ ```text
225
+ .
226
+ β”œβ”€β”€ app.py
227
+ β”œβ”€β”€ requirements.txt
228
+ β”œβ”€β”€ README.md
229
+ β”œβ”€β”€ assets/
230
+ β”œβ”€β”€ workflows/
231
+ β”œβ”€β”€ prompts/
232
+ β”œβ”€β”€ reports/
233
+ β”œβ”€β”€ utils/
234
+ └── components/
235
+ ```
236
 
237
  Recommended modularization:
238
 
 
253
 
254
  Clone the repository:
255
 
256
+ ```bash
257
+ git clone https://github.com/your-org/purple-team-code-workbench.git
258
+ cd purple-team-code-workbench
259
+ ```
260
 
261
  Create a virtual environment:
262
 
263
+ ```bash
264
+ python -m venv .venv
265
+ ```
266
 
267
  Activate the environment:
268
 
269
  #### Linux/macOS
270
 
271
+ ```bash
272
+ source .venv/bin/activate
273
+ ```
274
 
275
  #### Windows
276
 
277
+ ```powershell
278
+ .venv\Scripts\activate
279
+ ```
280
 
281
  Install dependencies:
282
 
283
+ ```bash
284
+ pip install -r requirements.txt
285
+ ```
286
 
287
  Run the application:
288
 
289
+ ```bash
290
+ streamlit run app.py
291
+ ```
292
 
293
  ---
294
 
 
303
 
304
  Example metadata:
305
 
306
+ ```yaml
307
+ sdk: streamlit sdk_version: 1.57.0 app_file: app.py license: apache-2.0
308
+ ```
309
  ---
310
 
311
+ ## Inference Providers
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
312
 
313
+ Model availability may vary depending on:
314
 
315
+ - Hugging Face Inference Providers
316
+ - External API routing
317
+ - Local runtime configuration
318
+ - OAuth authentication state
319
+ - Deployment hardware constraints
320
 
321
  ---
322
 
 
337
 
338
  ## Example Workflow
339
 
340
+ ```text
341
+ Scope Definition ↓ Passive Recon ↓ Evidence Collection ↓ Finding Classification ↓ Code/Prompt Generation ↓ Human Validation ↓ Report Export
342
+ ```
343
 
344
  ---
345