elselse commited on
Commit
d730b4f
·
verified ·
1 Parent(s): 45744a2

Update app.py

Browse files
Files changed (1) hide show
  1. app.py +4 -5
app.py CHANGED
@@ -37,12 +37,11 @@ demo = gr.Interface(
37
  title="CWE Prediction from Commit Message or Vulnerability Description",
38
  description="This tool uses a fine-tuned model to predict CWE categories from Git commit messages and vulnerability descriptions. "
39
  "Predicted child CWEs are mapped to their parent CWEs if applicable.",
40
- examples=[
41
  ["A vulnerability has been found in cfire24 ajaxlife up to 0.3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.3.3 is able to address this issue. "],
42
- ["SQL injection possible in login flow"],
43
- ["Improved input validation to prevent XSS"],
44
- ["Added try/catch to avoid null pointer crash"],
45
- ["Patched race condition in thread lock logic"]
46
  ]
47
  )
48
 
 
37
  title="CWE Prediction from Commit Message or Vulnerability Description",
38
  description="This tool uses a fine-tuned model to predict CWE categories from Git commit messages and vulnerability descriptions. "
39
  "Predicted child CWEs are mapped to their parent CWEs if applicable.",
40
+ example1=[
41
  ["A vulnerability has been found in cfire24 ajaxlife up to 0.3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.3.3 is able to address this issue. "],
42
+ ]
43
+ example2=[
44
+ ["A testtt vulnerability has been found in cfire24 ajaxlife up to 0.3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.3.3 is able to address this issue. "],
 
45
  ]
46
  )
47