EryriLabs commited on
Commit
6127924
·
verified ·
1 Parent(s): 3b2ec47

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +97 -39
README.md CHANGED
@@ -1,39 +1,97 @@
1
- ---
2
- base_model:
3
- - WhiteRabbitNeo/WhiteRabbitNeo-2.5-Qwen-2.5-Coder-7B
4
- - deepseek-ai/DeepSeek-R1-Distill-Qwen-7B
5
- library_name: transformers
6
- tags:
7
- - mergekit
8
- - merge
9
-
10
- ---
11
- # out
12
-
13
- This is a merge of pre-trained language models created using [mergekit](https://github.com/cg123/mergekit).
14
-
15
- ## Merge Details
16
- ### Merge Method
17
-
18
- This model was merged using the SLERP merge method.
19
-
20
- ### Models Merged
21
-
22
- The following models were included in the merge:
23
- * [WhiteRabbitNeo/WhiteRabbitNeo-2.5-Qwen-2.5-Coder-7B](https://huggingface.co/WhiteRabbitNeo/WhiteRabbitNeo-2.5-Qwen-2.5-Coder-7B)
24
- * [deepseek-ai/DeepSeek-R1-Distill-Qwen-7B](https://huggingface.co/deepseek-ai/DeepSeek-R1-Distill-Qwen-7B)
25
-
26
- ### Configuration
27
-
28
- The following YAML configuration was used to produce this model:
29
-
30
- ```yaml
31
- models:
32
- - model: deepseek-ai/DeepSeek-R1-Distill-Qwen-7B
33
- - model: WhiteRabbitNeo/WhiteRabbitNeo-2.5-Qwen-2.5-Coder-7B
34
- merge_method: slerp
35
- base_model: deepseek-ai/DeepSeek-R1-Distill-Qwen-7B
36
- dtype: bfloat16
37
- parameters:
38
- t: [0, 0.5, 0.25]
39
- ```
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ base_model:
3
+ - WhiteRabbitNeo/WhiteRabbitNeo-2.5-Qwen-2.5-Coder-7B
4
+ - deepseek-ai/DeepSeek-R1-Distill-Qwen-7B
5
+ library_name: transformers
6
+ tags:
7
+ - mergekit
8
+ - merge
9
+
10
+ ---
11
+ # DeepSeek-R1-Distill-Qwen-7B-PurpleTeam
12
+
13
+
14
+ ## Model Description
15
+
16
+ DeepSeek-R1-Distill-Qwen-7B-PurpleTeam is a specialised cyber security model trained for ethical usage. It can assist professionals and enthusiasts in identifying potential vulnerabilities, misconfigurations, and common security pitfalls. The model is optimised for tasks such as analysing security logs, detecting unusual patterns, and suggesting remediation steps. However, it is vital to use this model responsibly and lawfully, respecting data privacy and all applicable regulations.
17
+
18
+ ## Intended Use and Limitations
19
+
20
+ - **Intended Use**: Cyber security analysis, vulnerability assessment, ethical hacking practices, and threat intelligence.
21
+ - **Not Intended For**: Illegal activities, personal data exploitation, or any use that infringes on applicable laws or violates individual rights.
22
+
23
+ **Disclaimer**: This model is not a substitute for professional cyber security experts. Always validate outputs, follow legal regulations, and ensure full compliance with data protection requirements.
24
+
25
+ ## Usage Restrictions (WhiteRabbitNeo Extension to Apache-2.0 License)
26
+
27
+ You agree not to use the Model or Derivatives of the Model:
28
+
29
+ 1. In any way that violates any applicable national or international law or regulation or infringes upon the lawful rights and interests of any third party
30
+ 2. For military use in any way
31
+ 3. For the purpose of exploiting, harming or attempting to exploit or harm minors in any way
32
+ 4. To generate or disseminate verifiably false information and/or content with the purpose of harming others
33
+ 5. To generate or disseminate inappropriate content subject to applicable regulatory requirements
34
+ 6. To generate or disseminate personal identifiable information without due authorisation or for unreasonable use
35
+ 7. To defame, disparage or otherwise harass others
36
+ 8. For fully automated decision making that adversely impacts an individual's legal rights or otherwise creates or modifies a binding, enforceable obligation
37
+ 9. For any use intended to or which has the effect of discriminating against or harming individuals or groups based on online or offline social behaviour or known or predicted personal or personality characteristics
38
+ 10. To exploit any of the vulnerabilities of a specific group of persons based on their age, social, physical or mental characteristics
39
+ 11. For any use intended to or which has the effect of discriminating against individuals or groups based on legally protected characteristics or categories
40
+
41
+ ## Topics Covered
42
+
43
+ The model covers various cybersecurity topics including:
44
+
45
+ - Open Ports (HTTP, FTP, SSH, SMB, etc.)
46
+ - Outdated Software or Services
47
+ - Default Credentials
48
+ - Misconfigurations
49
+ - Injection Flaws (SQL injection, command injection, XSS)
50
+ - Unencrypted Services
51
+ - Known Software Vulnerabilities
52
+ - Cross-Site Request Forgery (CSRF)
53
+ - Insecure Direct Object References
54
+ - Security Misconfigurations in Web Servers/Applications
55
+ - Broken Authentication and Session Management
56
+ - Sensitive Data Exposure
57
+ - API Vulnerabilities
58
+ - Denial of Service (DoS) Vulnerabilities
59
+ - Buffer Overflows
60
+ - Other common security pitfalls
61
+
62
+ ## Terms of Use
63
+
64
+ By accessing and using this Artificial Intelligence (AI) model, you, the user, acknowledge and agree that you are solely responsible for your use of the model and its outcomes. You hereby agree to indemnify, defend, and hold harmless the creators, developers, and any affiliated persons or entities of this AI model from and against any and all claims, liabilities, damages, losses, costs, expenses, fees (including reasonable solicitors' fees and court costs) that may arise, directly or indirectly, from your use of the AI model.
65
+
66
+ This AI model is provided "as is" and "as available" without any warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose, and non-infringement. The creators make no warranty that the AI model will meet your requirements or be available on an uninterrupted, secure, or error-free basis.
67
+
68
+ Your use of the AI model is at your own risk and discretion, and you will be solely responsible for any damage to computer systems or loss of data that results from the use of the AI model.
69
+
70
+ This disclaimer constitutes part of the agreement between you and the creators of the AI model regarding your use of the model, superseding any prior agreements between you and the creators regarding your use of this AI model.
71
+
72
+
73
+ ## Merge Details
74
+ ### Merge Method
75
+
76
+ This model was merged using the SLERP merge method.
77
+
78
+ ### Models Merged
79
+
80
+ The following models were included in the merge:
81
+ * [WhiteRabbitNeo/WhiteRabbitNeo-2.5-Qwen-2.5-Coder-7B](https://huggingface.co/WhiteRabbitNeo/WhiteRabbitNeo-2.5-Qwen-2.5-Coder-7B)
82
+ * [deepseek-ai/DeepSeek-R1-Distill-Qwen-7B](https://huggingface.co/deepseek-ai/DeepSeek-R1-Distill-Qwen-7B)
83
+
84
+ ### Configuration
85
+
86
+ The following YAML configuration was used to produce this model:
87
+
88
+ ```yaml
89
+ models:
90
+ - model: deepseek-ai/DeepSeek-R1-Distill-Qwen-7B
91
+ - model: WhiteRabbitNeo/WhiteRabbitNeo-2.5-Qwen-2.5-Coder-7B
92
+ merge_method: slerp
93
+ base_model: deepseek-ai/DeepSeek-R1-Distill-Qwen-7B
94
+ dtype: bfloat16
95
+ parameters:
96
+ t: [0, 0.5, 0.25]
97
+ ```