section
stringclasses 4
values | name
stringclasses 6
values | description
stringclasses 6
values | payload_json
stringclasses 6
values | version
stringclasses 1
value | created_at
stringdate 2025-10-23 02:16:38
2025-10-23 02:16:38
|
|---|---|---|---|---|---|
sampling
|
e2-k8s-terraform
|
E2 config verification dataset sampling metadata (K8s and Terraform)
|
{"mode":"full","k8s_root":"scripts/data/sources/kubernetes","tf_root":"scripts/data/sources/terraform","rego_dir":"environments/sv-env-config-verification/policies","datasets":{"k8s":{"files_scanned":462,"total_items":462,"with_violations":255},"terraform":{"files_scanned":260,"total_items":260,"with_violations":4}},"tools":{"kube-linter":"0.7.6","semgrep":"1.137.0","opa":"Version: 1.8.0"},"patch_verified":null}
|
v1
|
2025-10-23T02:16:38.160161Z
|
tools
|
tool-versions
|
Pinned security tool versions for reproducible scanning
|
{"kube-linter":"0.7.6","semgrep":"1.140.0","opa":"Version: 1.9.0"}
|
v1
|
2025-10-23T02:16:38.160161Z
|
tools
|
tool-descriptions
|
Security tools used for ground-truth violation detection
|
{"kube-linter":{"description":"Kubernetes YAML linting and security checks","url":"https://github.com/stackrox/kube-linter"},"semgrep":{"description":"Pattern-based static analysis for K8s and Terraform","url":"https://semgrep.dev"},"opa":{"description":"Policy-as-code validation with Rego","url":"https://www.openpolicyagent.org"}}
|
v1
|
2025-10-23T02:16:38.160161Z
|
provenance
|
dataset-sources
|
Source repositories for Kubernetes and Terraform configurations
|
{"k8s":{"description":"Real-world K8s manifests from popular open-source projects","examples":["kubernetes/examples","kubernetes/kubernetes"],"scanning":"KubeLinter, Semgrep, OPA/Rego policies"},"terraform":{"description":"Infrastructure-as-code from real projects","examples":["hashicorp/terraform-provider-aws"],"scanning":"Semgrep, OPA/Rego policies"}}
|
v1
|
2025-10-23T02:16:38.160161Z
|
notes
|
privacy-rationale
|
Explanation of private dataset hosting to prevent training contamination
|
{"reason":"Training contamination prevention","details":"Datasets are private to preserve benchmark validity and enable fair model comparisons over time.","access":"Request access via GitHub Issues: https://github.com/intertwine/security-verifiers/issues"}
|
v1
|
2025-10-23T02:16:38.160161Z
|
notes
|
multi-turn-performance
|
Performance comparison with and without tool calling
|
{"with_tools":0.93,"without_tools":0.62,"note":"Models achieve significantly higher reward when using tool calling for verification"}
|
v1
|
2025-10-23T02:16:38.160161Z
|
๐ Security Verifiers E2: Security Configuration Verification (Public Metadata)
โ ๏ธ This is a PUBLIC metadata-only repository. The full datasets are hosted privately to prevent training contamination. See below for access instructions.
Overview
E2 is a tool-grounded configuration auditing environment for Kubernetes and Terraform. This repository contains only the sampling metadata that describes how the private datasets were constructed.
Why Private Datasets?
Training contamination is a critical concern for benchmark integrity. If datasets leak into public training corpora:
- Models can memorize answers instead of learning to reason
- Evaluation metrics become unreliable
- Research reproducibility suffers
- True capabilities become obscured
By keeping evaluation datasets private with gated access, we:
- โ Preserve benchmark validity over time
- โ Enable fair model comparisons
- โ Maintain research integrity
- โ Allow controlled access for legitimate research
Dataset Composition
The private E2 datasets include:
Kubernetes Configurations
- Source: Real-world K8s manifests from popular open-source projects
- Scans: KubeLinter, Semgrep, OPA/Rego policies
- Violations: Security misconfigurations, best practice violations
- Severity: Categorized (high/medium/low) based on tool outputs
Terraform Configurations
- Source: Infrastructure-as-code from real projects
- Scans: Semgrep, OPA/Rego policies, custom rules
- Violations: Security risks, compliance issues
- Severity: Weighted scoring for reward computation
What's in This Repository?
This public repository contains:
Sampling Metadata (
sampling-*.json):- Source repository information
- File selection criteria
- Scan configurations
- Label distributions
- Reproducibility parameters
Tools Versions (
tools-versions.json):- KubeLinter version (pinned)
- Semgrep version (pinned)
- OPA version (pinned)
- Ensures reproducible scanning
This README: Instructions for requesting access
Reward Components
E2 uses tool-grounded reward functions:
- Detection Precision/Recall/F1: Against ground-truth violations
- Severity Weighting: Higher reward for catching critical issues
- Patch Delta: Reward for proposed fixes that eliminate violations
- Re-scan Verification: Patches must pass tool validation
Multi-turn performance: Models achieve ~0.93 reward with tool calling vs ~0.62 without tools.
Requesting Access
๐ To access the full private datasets:
- Open an access request issue: Security Verifiers Issues
- Use the title: "Dataset Access Request: E2"
- Include:
- Your name and affiliation
- Research purpose / use case
- HuggingFace username
- Commitment to not redistribute or publish the raw data
Approval criteria:
- Legitimate research or educational use
- Understanding of contamination concerns
- Agreement to usage terms
We typically respond within 2-3 business days.
Citation
If you use this environment or metadata in your research:
@misc{security-verifiers-2025,
title={Open Security Verifiers: Composable RL Environments for AI Safety},
author={intertwine},
year={2025},
url={https://github.com/intertwine/security-verifiers},
note={E2: Security Configuration Verification}
}
Related Resources
- GitHub Repository: intertwine/security-verifiers
- Documentation: See
EXECUTIVE_SUMMARY.mdandPRD.mdin the repo - Framework: Built on Prime Intellect Verifiers
- Other Environments: E1 (Network Logs), E3-E6 (in development)
Tools
The following security tools are used for ground-truth generation:
- KubeLinter: Kubernetes YAML linting and security checks
- Semgrep: Pattern-based static analysis for K8s and Terraform
- OPA: Policy-as-code validation with Rego
License
MIT License - See repository for full terms.
Contact
- Issues: GitHub Issues
- Discussions: GitHub Discussions
Built with โค๏ธ for the AI safety research community
- Downloads last month
- 26