data_source stringclasses 1
value | prompt listlengths 2 2 | ability stringclasses 1
value | reward_model dict | extra_info dict |
|---|---|---|---|---|
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "F",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-327"
],
"filename": "nda_aws_token_generator.py",
"index": 0,
"language": "python",
"options": [
"CWE-22",
"CWE-215",
"CWE-209",
"CWE-200",
"CWE-614",
"CWE-327"
],
"source_dataset": "OctoReasoner/codeql2_aggressive... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-327",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-327"
],
"filename": "nda_aws_token_generator.py",
"index": 1,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/datalad/support/third/nda_aws_token_generator.py",
"source_repo": "... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [
"__encode_password"
],
"cwe": "CWE-327",
"cwes_present": [],
"filename": "nda_aws_token_generator.py",
"index": 2,
"language": "python",
"options": [
"__encode_password",
"Token",
"session",
"secret_key"
],
"source_dataset": "OctoReasoner/codeql2_aggressive"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "__encode_password",
"style": "rule"
} | {
"all_acceptable": [
"__encode_password"
],
"cwe": "CWE-327",
"cwes_present": [],
"filename": "nda_aws_token_generator.py",
"index": 3,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/datalad/support/third/nda_aws_token_generator.py",
... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295"
],
"filename": "actions.py",
"index": 4,
"language": "python",
"options": [
"CWE-295",
"CWE-215",
"CWE-78",
"CWE-90",
"CWE-20",
"CWE-94"
],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path":... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-295",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-295"
],
"filename": "actions.py",
"index": 5,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/apps/easytask/actions.py",
"source_repo": "Hopetree/izone",
"split": "train",
"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [
"get_link_status"
],
"cwe": "CWE-295",
"cwes_present": [],
"filename": "actions.py",
"index": 6,
"language": "python",
"options": [
"get_link_status",
"action_cleanup_task_result",
"action_check_site_links",
"baidu_push"
],
"source_dataset": "OctoReasoner/co... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "get_link_status",
"style": "rule"
} | {
"all_acceptable": [
"get_link_status"
],
"cwe": "CWE-295",
"cwes_present": [],
"filename": "actions.py",
"index": 7,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/apps/easytask/actions.py",
"source_repo": "Hopetree/izone",
"split... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-327"
],
"filename": "mitm.py",
"index": 8,
"language": "python",
"options": [
"CWE-327",
"CWE-730",
"CWE-776",
"CWE-113",
"CWE-918",
"CWE-116"
],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-327",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-327"
],
"filename": "mitm.py",
"index": 9,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/mitm.py",
"source_repo": "jamescch/proxany",
"split": "train",
"target_function": ... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "B",
"style": "rule"
} | {
"all_acceptable": [
"CreateSocketAndConnectToOriginDst"
],
"cwe": "CWE-327",
"cwes_present": [],
"filename": "mitm.py",
"index": 10,
"language": "python",
"options": [
"ReadHeader",
"CreateSocketAndConnectToOriginDst",
"simpleRead",
"__init__"
],
"source_dataset": "OctoReasoner... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "CreateSocketAndConnectToOriginDst",
"style": "rule"
} | {
"all_acceptable": [
"CreateSocketAndConnectToOriginDst"
],
"cwe": "CWE-327",
"cwes_present": [],
"filename": "mitm.py",
"index": 11,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/mitm.py",
"source_repo": "jamescch/proxany",
"spli... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "F",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-116"
],
"filename": "xmlparser.py",
"index": 12,
"language": "python",
"options": [
"CWE-732",
"CWE-295",
"CWE-502",
"CWE-74",
"CWE-117",
"CWE-116"
],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-116",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-116"
],
"filename": "xmlparser.py",
"index": 13,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/tfbuilder/helpertools/xmlparser.py",
"source_repo": "pthu/tfbuilder",
"split":... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "user.py",
"index": 14,
"language": "python",
"options": [
"CWE-312",
"CWE-502",
"CWE-74",
"CWE-79",
"CWE-918",
"CWE-113"
],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path":... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "user.py",
"index": 15,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/user.py",
"source_repo": "dennismwaniki67/passwordlocker",
"split": "train",
"tar... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multiple-choice question listing several function or class names from that file. Your task is to identify which one contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the single letter... | code_security | {
"ground_truth": "C",
"style": "rule"
} | {
"all_acceptable": [
"generate_password"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "user.py",
"index": 16,
"language": "python",
"options": [
"del_credential",
"check_user",
"generate_password",
"save_user"
],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"so... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file. Your task is to name the single function or class that contains the specified CWE vulnerability.\n\nOUTPUT FORMAT: Respond with the exact function or class name (no parentheses, no qualifiers, no module prefixes), wrap... | code_security | {
"ground_truth": "generate_password",
"style": "rule"
} | {
"all_acceptable": [
"generate_password"
],
"cwe": "CWE-312",
"cwes_present": [],
"filename": "user.py",
"index": 17,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/user.py",
"source_repo": "dennismwaniki67/passwordlocker",
"split"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "A",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "dates.py",
"index": 18,
"language": "python",
"options": [
"CWE-312",
"CWE-78",
"CWE-918",
"CWE-776",
"CWE-22",
"CWE-20"
],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path":... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "dates.py",
"index": 19,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/dates.py",
"source_repo": "StarSky1/microsoft-python-study",
"split": "train",
"... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "D",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-918"
],
"filename": "์ง๋๊ตฌํ.py",
"index": 20,
"language": "python",
"options": [
"CWE-74",
"CWE-295",
"CWE-90",
"CWE-918",
"CWE-200",
"CWE-776"
],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path":... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-918",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-918"
],
"filename": "์ง๋๊ตฌํ.py",
"index": 21,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/ํ๋ก์ ํธ/์ฝ๋/์ง๋๊ตฌํ.py",
"source_repo": "gusdn3477/2020-data-campus-sejong",
"split": "tra... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a multi-select question listing several CWE (Common Weakness Enumeration) categories. Your task is to identify which of the listed CWEs are present in the code.\n\nOUTPUT FORMAT: Respond with the letter(s) of... | code_security | {
"ground_truth": "E",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "gen.py",
"index": 22,
"language": "python",
"options": [
"CWE-502",
"CWE-295",
"CWE-327",
"CWE-79",
"CWE-312",
"CWE-200"
],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path":... |
sast_cwe | [
{
"content": "You are an expert security code reviewer. You will be shown a source code file along with a catalog of candidate CWE (Common Weakness Enumeration) categories with their official MITRE names. Your task is to list every distinct CWE from that catalog that is actually present in the code. The catalog... | code_security | {
"ground_truth": "CWE-312",
"style": "rule"
} | {
"all_acceptable": [],
"cwe": "",
"cwes_present": [
"CWE-312"
],
"filename": "gen.py",
"index": 23,
"language": "python",
"options": [],
"source_dataset": "OctoReasoner/codeql2_aggressive",
"source_path": "/c_core_librairies/sol_b/annuity_lib/gen.py",
"source_repo": "nicolasessisbreton/pyzehe... |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 11