---
language:
- en
base_model:
- Salesforce/codet5p-220m
pipeline_tag: text2text-generation
---
# Model Card: Thoth-v2.5
## Summary
**Thoth-v2.5** is a fine-tuned model based on `Salesforce/codet5p-220m`, specifically designed to extract two key pieces of information from a payload string:
- **attack_syntax**: The suspicious attack pattern (e.g., ````
```
### Output
```json
{
"attack_syntax": "",
"attack_type": "Cross Site Scripting (XSS)"
}
```
## Training Details
- **Training Data**: Proprietary dataset curated by Seculayer, containing annotated payloads and attack types.
- **Fine-Tuning Base**: Salesforce/codet5p-220m
## Limitations & Risks
- **False Positives/Negatives**: The model may misclassify benign strings as attacks or fail to detect obfuscated or novel attack patterns.
- **Pattern-Based Only**: Thoth-v2.5 relies solely on pattern recognition and does not infer intent or contextual meaning.
- **Single-Payload Input**: The model operates on isolated payload strings and does not process broader request/response context.
## License & Usage Restrictions
- **License**: Non-commercial use only.
- **Restrictions**: This model and its outputs must not be used for commercial purposes, including integration into commercial security solutions, products, or services, without explicit written permission from Seculayer.