--- language: - en base_model: - Salesforce/codet5p-220m pipeline_tag: text2text-generation --- # Model Card: Thoth-v2.5 ## Summary **Thoth-v2.5** is a fine-tuned model based on `Salesforce/codet5p-220m`, specifically designed to extract two key pieces of information from a payload string: - **attack_syntax**: The suspicious attack pattern (e.g., ```` ``` ### Output ```json { "attack_syntax": "", "attack_type": "Cross Site Scripting (XSS)" } ``` ## Training Details - **Training Data**: Proprietary dataset curated by Seculayer, containing annotated payloads and attack types. - **Fine-Tuning Base**: Salesforce/codet5p-220m ## Limitations & Risks - **False Positives/Negatives**: The model may misclassify benign strings as attacks or fail to detect obfuscated or novel attack patterns. - **Pattern-Based Only**: Thoth-v2.5 relies solely on pattern recognition and does not infer intent or contextual meaning. - **Single-Payload Input**: The model operates on isolated payload strings and does not process broader request/response context. ## License & Usage Restrictions - **License**: Non-commercial use only. - **Restrictions**: This model and its outputs must not be used for commercial purposes, including integration into commercial security solutions, products, or services, without explicit written permission from Seculayer.