daqc commited on
Commit
fdb1447
·
verified ·
1 Parent(s): fee438e

Update app.py

Browse files
Files changed (1) hide show
  1. app.py +7 -1
app.py CHANGED
@@ -413,9 +413,15 @@ class GradioUI:
413
  if has_memory:
414
  print(f"Memory type: {type(session_data['agent'].memory)}")
415
 
 
 
 
 
416
  # Prepare the system prompt
417
  system_prompt = f"""You are a Vulnerability Intelligence Analyst. Complete the user request in {session_data.get('max_steps', 10)} steps maximum.
418
 
 
 
419
  AVAILABLE TOOLS: nvd_search, web_search, cvedb_search, kevin_search, epss_search
420
 
421
  CRITICAL RULES:
@@ -430,7 +436,7 @@ CRITICAL RULES:
430
  - CORRECT LOGIC: If CVE affects "up to v22.1" and user asks about v24.0 then v24.0 is NOT vulnerable
431
  - CORRECT LOGIC: If CVE affects "v25.0+" and user asks about v24.0 then v24.0 is NOT vulnerable
432
  - CORRECT LOGIC: If CVE affects "below v25.0" and user asks about v24.0 then v24.0 is vulnerable
433
- 2. DATES: If user provides specific date, use that date. If user mentions "today", "current", "as of today", or "recent", use: from datetime import datetime; today = datetime.now().strftime("%Y-%m-%d"); print(f"Today is {today}") - ALWAYS print it directly, no code blocks.
434
  3. PRODUCT SEARCH: ALWAYS use ONLY the base product name, NEVER include versions when using vulnerability tools (nvd_search, cvedb_search, kevin_search, epss_search)
435
  4. SOURCES: Always prioritize vendor/original sources for CVE, CWE, and reference links (official vendor websites, security advisories)
436
  5. SIMPLICITY: Keep code simple and logical. Avoid unnecessary library imports. Use only basic Python functions when needed.
 
413
  if has_memory:
414
  print(f"Memory type: {type(session_data['agent'].memory)}")
415
 
416
+ # Get current date for the prompt
417
+ from datetime import datetime
418
+ current_date = datetime.now().strftime("%Y-%m-%d")
419
+
420
  # Prepare the system prompt
421
  system_prompt = f"""You are a Vulnerability Intelligence Analyst. Complete the user request in {session_data.get('max_steps', 10)} steps maximum.
422
 
423
+ TODAY'S DATE: {current_date}
424
+
425
  AVAILABLE TOOLS: nvd_search, web_search, cvedb_search, kevin_search, epss_search
426
 
427
  CRITICAL RULES:
 
436
  - CORRECT LOGIC: If CVE affects "up to v22.1" and user asks about v24.0 then v24.0 is NOT vulnerable
437
  - CORRECT LOGIC: If CVE affects "v25.0+" and user asks about v24.0 then v24.0 is NOT vulnerable
438
  - CORRECT LOGIC: If CVE affects "below v25.0" and user asks about v24.0 then v24.0 is vulnerable
439
+ 2. DATES: If user provides specific date, use that date. If user mentions "today", "current", "as of today", or "recent", use TODAY'S DATE above.
440
  3. PRODUCT SEARCH: ALWAYS use ONLY the base product name, NEVER include versions when using vulnerability tools (nvd_search, cvedb_search, kevin_search, epss_search)
441
  4. SOURCES: Always prioritize vendor/original sources for CVE, CWE, and reference links (official vendor websites, security advisories)
442
  5. SIMPLICITY: Keep code simple and logical. Avoid unnecessary library imports. Use only basic Python functions when needed.