id string | topic string | prompt string | answer string | alternates list | disqualifiers list | must_appear list |
|---|---|---|---|---|---|---|
fr2-001 | cve | What is the CVE identifier for the EternalBlue SMB vulnerability? | CVE-2017-0144 | [
"CVE-2017-0144"
] | null | null |
fr2-002 | cve | What CVE was the Log4Shell vulnerability assigned? | CVE-2021-44228 | [
"CVE-2021-44228"
] | null | null |
fr2-003 | cve | Heartbleed in OpenSSL has which CVE identifier? | CVE-2014-0160 | [
"CVE-2014-0160"
] | null | null |
fr2-004 | cve | What is the CVE for the Shellshock Bash vulnerability? | CVE-2014-6271 | [
"CVE-2014-6271"
] | null | null |
fr2-005 | cve | BlueKeep, the wormable RDP RCE, has which CVE? | CVE-2019-0708 | [
"CVE-2019-0708"
] | null | null |
fr2-006 | cve | What CVE was assigned to the Spring4Shell remote code execution vulnerability? | CVE-2022-22965 | [
"CVE-2022-22965"
] | null | null |
fr2-007 | cve | PrintNightmare in Windows Print Spooler is which CVE? | CVE-2021-34527 | [
"CVE-2021-34527",
"CVE-2021-1675"
] | null | null |
fr2-008 | cve | The original Apache Struts2 OGNL injection used in the Equifax breach was which CVE? | CVE-2017-5638 | [
"CVE-2017-5638"
] | null | null |
fr2-009 | cve | What CVE identifies the Dirty COW Linux privilege escalation? | CVE-2016-5195 | [
"CVE-2016-5195"
] | null | null |
fr2-010 | cve | Spectre Variant 1 (bounds check bypass) is tracked as which CVE? | CVE-2017-5753 | [
"CVE-2017-5753"
] | null | null |
fr2-011 | cve | Meltdown (CPU-cache speculative-execution attack) has which CVE? | CVE-2017-5754 | [
"CVE-2017-5754"
] | null | null |
fr2-012 | cve | What CVE is the ProxyShell Exchange Server chain's authentication-bypass component? | CVE-2021-34473 | [
"CVE-2021-34473"
] | null | null |
fr2-013 | cve | What is the CVE for the OpenSSH 'regreSSHion' pre-auth RCE disclosed by Qualys in 2024? | CVE-2024-6387 | [
"CVE-2024-6387"
] | null | null |
fr2-014 | cve | Follina, the Microsoft MSDT zero-click via Office documents, has which CVE? | CVE-2022-30190 | [
"CVE-2022-30190"
] | null | null |
fr2-015 | cve | What CVE covers the F5 BIG-IP iControl REST authentication bypass disclosed in 2022? | CVE-2022-1388 | [
"CVE-2022-1388"
] | null | null |
fr2-016 | cve | What CVE was assigned to the GoAnywhere MFT zero-day exploited by Cl0p in early 2023? | CVE-2023-0669 | [
"CVE-2023-0669"
] | null | null |
fr2-017 | cve | What is the CVE for the MOVEit Transfer SQL injection exploited by Cl0p in mid-2023? | CVE-2023-34362 | [
"CVE-2023-34362"
] | null | null |
fr2-018 | cve | Citrix Bleed (NetScaler ADC information disclosure) has which CVE? | CVE-2023-4966 | [
"CVE-2023-4966"
] | null | null |
fr2-019 | cve | ZeroLogon, the Netlogon cryptographic flaw allowing domain takeover, is which CVE? | CVE-2020-1472 | [
"CVE-2020-1472"
] | null | null |
fr2-020 | cve | What CVE is the Polkit pkexec local privilege escalation known as 'PwnKit'? | CVE-2021-4034 | [
"CVE-2021-4034"
] | null | null |
fr2-021 | cve | What CVE identifies the SolarWinds Orion supply-chain backdoor (SUNBURST) initial-access vulnerability? | CVE-2020-10148 | [
"CVE-2020-10148"
] | null | null |
fr2-022 | cve | What CVE is the Atlassian Confluence OGNL injection from June 2022? | CVE-2022-26134 | [
"CVE-2022-26134"
] | null | null |
fr2-023 | cve | What CVE is the Ivanti Connect Secure / Pulse Secure SSL VPN auth bypass disclosed January 2024? | CVE-2023-46805 | [
"CVE-2023-46805"
] | null | null |
fr2-024 | cve | What CVE pairs with CVE-2023-46805 in the Ivanti chain (the command-injection half)? | CVE-2024-21887 | [
"CVE-2024-21887"
] | null | null |
fr2-025 | cve | What is the CVE for the Apache HTTP Server path-traversal disclosed October 2021? | CVE-2021-41773 | [
"CVE-2021-41773"
] | null | null |
fr2-026 | cve | What CVE describes the Sudo heap overflow disclosed January 2021 (Baron Samedit)? | CVE-2021-3156 | [
"CVE-2021-3156"
] | null | null |
fr2-027 | cve | What CVE identifies the Linux kernel netfilter use-after-free 'StackRot' from July 2023? | CVE-2023-3269 | [
"CVE-2023-3269"
] | null | null |
fr2-028 | cve | What is the CVE for the Microsoft Exchange ProxyLogon SSRF authentication bypass? | CVE-2021-26855 | [
"CVE-2021-26855"
] | null | null |
fr2-029 | cve | What CVE identifies the Cisco IOS XE web UI privilege escalation disclosed October 2023? | CVE-2023-20198 | [
"CVE-2023-20198"
] | null | null |
fr2-030 | cve | What CVE describes the Fortinet FortiOS SSL VPN heap overflow disclosed December 2022? | CVE-2022-42475 | [
"CVE-2022-42475"
] | null | null |
fr2-031 | mitre | What MITRE ATT&CK technique ID is 'Command and Scripting Interpreter'? | T1059 | [
"T1059"
] | null | null |
fr2-032 | mitre | Which MITRE ATT&CK technique covers PowerShell specifically as a sub-technique? | T1059.001 | [
"T1059.001"
] | null | null |
fr2-033 | mitre | What MITRE ATT&CK technique ID is 'Phishing'? | T1566 | [
"T1566"
] | null | null |
fr2-034 | mitre | What MITRE ATT&CK technique covers 'Valid Accounts'? | T1078 | [
"T1078"
] | null | null |
fr2-035 | mitre | What MITRE ATT&CK technique ID is 'OS Credential Dumping'? | T1003 | [
"T1003"
] | null | null |
fr2-036 | mitre | What MITRE ATT&CK technique covers 'Scheduled Task/Job'? | T1053 | [
"T1053"
] | null | null |
fr2-037 | mitre | What MITRE ATT&CK technique ID is 'Lateral Movement via Remote Services'? | T1021 | [
"T1021"
] | null | null |
fr2-038 | mitre | What MITRE ATT&CK tactic does TA0001 represent? | Initial Access | [
"Initial Access"
] | null | null |
fr2-039 | mitre | What MITRE ATT&CK tactic does TA0003 represent? | Persistence | [
"Persistence"
] | null | null |
fr2-040 | mitre | What MITRE ATT&CK tactic is TA0010? | Exfiltration | [
"Exfiltration"
] | null | null |
fr2-041 | mitre | What MITRE ATT&CK technique ID is 'Process Injection'? | T1055 | [
"T1055"
] | null | null |
fr2-042 | mitre | What MITRE ATT&CK technique covers 'Hijack Execution Flow: DLL Side-Loading'? | T1574.002 | [
"T1574.002"
] | null | null |
fr2-043 | mitre | What MITRE ATT&CK technique ID covers 'Exploit Public-Facing Application'? | T1190 | [
"T1190"
] | null | null |
fr2-044 | mitre | What MITRE ATT&CK technique ID is 'Remote Services: SMB/Windows Admin Shares'? | T1021.002 | [
"T1021.002"
] | null | null |
fr2-045 | mitre | What MITRE ATT&CK technique covers 'Application Layer Protocol' for C2 communication? | T1071 | [
"T1071"
] | null | null |
fr2-046 | cwe | What CWE number is 'SQL Injection'? | CWE-89 | [
"CWE-89"
] | null | null |
fr2-047 | cwe | What CWE number is 'Cross-Site Scripting' (Reflected/Stored/DOM general)? | CWE-79 | [
"CWE-79"
] | null | null |
fr2-048 | cwe | What CWE number describes 'Path Traversal'? | CWE-22 | [
"CWE-22"
] | null | null |
fr2-049 | cwe | What CWE number is 'Use of Hard-coded Credentials'? | CWE-798 | [
"CWE-798"
] | null | null |
fr2-050 | cwe | What CWE number describes 'Server-Side Request Forgery (SSRF)'? | CWE-918 | [
"CWE-918"
] | null | null |
fr2-051 | cwe | What CWE number is 'Cross-Site Request Forgery (CSRF)'? | CWE-352 | [
"CWE-352"
] | null | null |
fr2-052 | cwe | What CWE describes 'Improper Restriction of Operations within the Bounds of a Memory Buffer'? | CWE-119 | [
"CWE-119"
] | null | null |
fr2-053 | cwe | What CWE number is 'Use After Free'? | CWE-416 | [
"CWE-416"
] | null | null |
fr2-054 | cwe | What CWE number describes 'NULL Pointer Dereference'? | CWE-476 | [
"CWE-476"
] | null | null |
fr2-055 | cwe | What CWE number is 'Improper Authentication'? | CWE-287 | [
"CWE-287"
] | null | null |
fr2-056 | cwe | What CWE number describes 'Insecure Deserialization' / 'Deserialization of Untrusted Data'? | CWE-502 | [
"CWE-502"
] | null | null |
fr2-057 | cwe | What CWE number is 'OS Command Injection'? | CWE-78 | [
"CWE-78"
] | null | null |
fr2-058 | cwe | What CWE number describes 'Integer Overflow or Wraparound'? | CWE-190 | [
"CWE-190"
] | null | null |
fr2-059 | cwe | What CWE describes 'Use of a Broken or Risky Cryptographic Algorithm'? | CWE-327 | [
"CWE-327"
] | null | null |
fr2-060 | cwe | What CWE number is 'Out-of-bounds Write'? | CWE-787 | [
"CWE-787"
] | null | null |
fr2-061 | owasp | In the OWASP Top 10 2021, what is A01 (the top category)? | Broken Access Control | [
"Broken Access Control",
"A01:2021"
] | null | null |
fr2-062 | owasp | In the OWASP Top 10 2021, what is A03 the category for? | Injection | [
"Injection"
] | null | null |
fr2-063 | owasp | In the OWASP Top 10 2021, what is A07 the category for? | Identification and Authentication Failures | [
"Identification and Authentication Failures"
] | null | null |
fr2-064 | owasp | In the OWASP Top 10 2021, what category number is 'Server-Side Request Forgery'? | A10 | [
"A10",
"A10:2021"
] | [
"A10:2017"
] | null |
fr2-065 | owasp | In the OWASP API Security Top 10 2023, what is API1 the category for? | Broken Object Level Authorization | [
"Broken Object Level Authorization",
"BOLA"
] | null | null |
fr2-066 | owasp | OWASP ASVS has how many verification levels? | three | [
"three",
"3 levels",
"Level 1, 2, 3"
] | [
"four levels",
"2 levels"
] | null |
fr2-067 | owasp | What does ASVS stand for? | Application Security Verification Standard | [
"Application Security Verification Standard"
] | null | null |
fr2-068 | owasp | What is the WSTG (OWASP testing methodology)? | Web Security Testing Guide | [
"Web Security Testing Guide"
] | null | null |
fr2-069 | owasp | OWASP categorizes 'Cryptographic Failures' under which Top 10 2021 number? | A02 | [
"A02",
"A02:2021"
] | null | null |
fr2-070 | owasp | OWASP categorizes 'Insecure Design' under which Top 10 2021 number? | A04 | [
"A04",
"A04:2021"
] | null | null |
fr2-071 | crypto | AES-128 uses how many rounds in encryption? | 10 | [
"10 rounds",
"10"
] | [
"12 rounds",
"14 rounds"
] | null |
fr2-072 | crypto | AES-256 uses how many rounds? | 14 | [
"14 rounds",
"14"
] | [
"10 rounds",
"12 rounds"
] | null |
fr2-073 | crypto | What is the output length in bits of SHA-256? | 256 bits | null | [
"384 bits",
"512 bits"
] | [
"256",
"bits"
] |
fr2-074 | crypto | Which hash algorithm produces a 160-bit digest? | SHA-1 | [
"SHA-1",
"SHA1"
] | [
"SHA-256",
"SHA-512"
] | null |
fr2-075 | crypto | What block-cipher mode is recommended for authenticated encryption (AEAD) in TLS 1.3? | GCM | [
"GCM",
"Galois/Counter Mode",
"ChaCha20-Poly1305"
] | null | null |
fr2-076 | crypto | What is the recommended minimum RSA key size as of NIST SP 800-57? | 2048 bits | [
"2048",
"RSA 2048"
] | [
"1024 bits",
"512 bits"
] | null |
fr2-077 | crypto | What elliptic curve does Ed25519 use? | Curve25519 | [
"Curve25519",
"Edwards 25519"
] | null | null |
fr2-078 | crypto | What is the IV size of AES-GCM in bits? | 96 bits | null | [
"128 bit IV",
"256 bit IV"
] | [
"96"
] |
fr2-079 | crypto | PBKDF2 stands for what? | Password-Based Key Derivation Function 2 | [
"Password-Based Key Derivation Function",
"Password Based Key Derivation Function"
] | null | null |
fr2-080 | crypto | What KDF was the winner of the Password Hashing Competition? | Argon2 | [
"Argon2",
"Argon2id"
] | null | null |
fr2-081 | protocol | What RFC defines TLS 1.3? | RFC 8446 | [
"RFC 8446",
"8446"
] | null | null |
fr2-082 | protocol | What RFC defines TLS 1.2? | RFC 5246 | [
"RFC 5246",
"5246"
] | null | null |
fr2-083 | protocol | What RFC defines HTTP/2? | RFC 7540 | [
"RFC 7540",
"7540",
"RFC 9113"
] | null | null |
fr2-084 | protocol | What RFC defines OAuth 2.0? | RFC 6749 | [
"RFC 6749",
"6749"
] | null | null |
fr2-085 | protocol | What RFC defines JSON Web Token (JWT)? | RFC 7519 | null | null | [
"7519",
"JWT"
] |
fr2-086 | protocol | What RFC defines DKIM (DomainKeys Identified Mail)? | RFC 6376 | [
"RFC 6376",
"6376"
] | null | null |
fr2-087 | protocol | What RFC defines DMARC? | RFC 7489 | [
"RFC 7489",
"7489"
] | null | null |
fr2-088 | protocol | What is the standard port for SSH? | 22 | [
"port 22",
"TCP 22"
] | [
"port 23",
"port 2222"
] | null |
fr2-089 | protocol | What is the standard port for SMTPS (SMTP over SSL/TLS)? | 465 | [
"port 465"
] | null | null |
fr2-090 | protocol | What is the standard port for LDAP over TLS (LDAPS)? | 636 | [
"port 636"
] | null | null |
fr2-091 | protocol | What TCP port does Kerberos use? | 88 | [
"port 88",
"TCP 88"
] | null | null |
fr2-092 | tool | What command-line flag tells Nmap to perform OS fingerprinting? | -O | [
"-O",
"--osscan"
] | null | null |
fr2-093 | tool | What Sysinternals tool dumps process memory by name (used for credential extraction)? | procdump | [
"procdump",
"procdump.exe"
] | null | null |
fr2-094 | tool | What is the default name of the LSASS process whose memory contains Windows credentials? | lsass.exe | [
"lsass.exe",
"lsass"
] | null | null |
fr2-095 | tool | What command lists running services on a Windows host from cmd? | sc query | [
"sc query",
"sc.exe query"
] | null | null |
fr2-096 | tool | What Windows event ID logs a successful logon (NTLM/Kerberos) on a domain controller? | 4624 | [
"4624",
"Event ID 4624"
] | null | null |
fr2-097 | tool | What Windows event ID indicates a Kerberos service ticket request (TGS-REQ)? | 4769 | [
"4769",
"Event ID 4769"
] | null | null |
fr2-098 | misc | What is the maximum CVSS v3.1 base score? | 10.0 | [
"10",
"10.0"
] | [
"9.8",
"9.0"
] | null |
fr2-099 | misc | What is the CVSS v3.1 severity band for a base score of 9.0-10.0? | Critical | [
"Critical"
] | null | null |
fr2-100 | misc | What standard governs PCI DSS as of version 4.0? | PCI DSS 4.0 | [
"PCI DSS 4.0",
"Payment Card Industry Data Security Standard"
] | null | null |
Cybersec Fact-Recall Benchmark (GhostLM v2)
Free-form short-answer benchmark for small cybersecurity language models. Built and used by the GhostLM project as the truth metric for the ghost-base v1.0 acceptance gate.
Why this exists
Multiple-choice cybersec benchmarks like CTIBench and SecQA reward register matching (the model picks the option that "looks like" a security answer) as much as actual factual recall. A small from- scratch model can hit 28-30% on those without knowing a single CVE identifier. Free-form generation strips that crutch away: if the model knows EternalBlue is CVE-2017-0144, it surfaces the ID; if it doesn't, it confabulates a plausible-looking but wrong CVE.
Dataset structure
100-question seed (v2.0; growing toward 200 in subsequent releases):
| Topic | Count |
|---|---|
| cve | 30 |
| mitre | 15 |
| cwe | 15 |
| protocol | 11 |
| owasp | 10 |
| crypto | 10 |
| tool | 6 |
| misc | 3 |
One JSON object per line with fields:
{
"id": "fr2-001",
"topic": "cve",
"prompt": "What is the CVE identifier for the EternalBlue SMB vulnerability?",
"answer": "CVE-2017-0144",
"alternates": ["CVE-2017-0144"],
"boundary_match": true,
"disqualifiers": ["EternalBlue"],
"must_appear": ["RFC 7519", "JWT"]
}
Every record has id, topic, prompt, answer. The rest is
optional; defaults are alternates: [], boundary_match: true,
disqualifiers: [], must_appear: [].
Grading semantics
Three schema fields tighten the grader vs naive substring match:
boundary_match(defaulttrue). Match only when the candidate appears with non-alphanumeric characters on both sides."10"no longer matches inside"100".disqualifiers. List of phrases that, if present in the completion, void any match credit. Used on echoing-risk questions where the model can surface the answer simply by quoting back the question prompt.must_appear. ALL listed substrings must appear (boundary- matched). Used for composite-fact questions like "what RFC defines JWT?" requiring both"RFC 7519"and"JWT"together.
Reference grader: scripts/eval_fact_recall_v2.py
in the GhostLM repo (Apache 2.0). 11 unit tests cover the boundary,
disqualifier, and must_appear edge cases.
Baseline numbers (2026-05-07)
GhostLM ghost-small (45-81M parameters) chat checkpoints score at the floor across the board. Greedy generation, 120-token budget, M4 MPS.
| Checkpoint | Params | Hits / 100 | Rate | Per-topic hit |
|---|---|---|---|---|
| ghost-small v0.4 chat-v3 | 45M | 0 | 0.0% | (none) |
| ghost-small v0.7 chat | 81M | 1 | 1.0% | misc 1/3 |
| ghost-small v0.9 chat | 81M | 1 | 1.0% | owasp 1/10 |
The line saturates at the bench floor as expected: at this parameter count the model has the register of cybersec writing but not the facts in any retrievable form. Both v0.7 and v0.9 "hits" are likely spurious echoes of question keywords (the misc topic asks about CVSS bounds; the owasp topic asks about Top-10 labels that appear in many corpus passages). The smart grader doesn't invent false positives but it can't distinguish "knows the fact" from "has seen the substring close to similar prose".
Acceptance criterion
The GhostLM project uses >=30% on this bench as one of three ways the next architectural rung (ghost-base, ~360M parameters) can clear its acceptance gate. If a 360M from-scratch model hits 30%+ free-form fact recall on cybersec questions, that validates the parameter-scaling hypothesis. The other two gates are CTIBench full
=40% and the in-repo CTF MCQ >=65%.
Loading
from datasets import load_dataset
ds = load_dataset("Ghostgim/cybersec-fact-recall", data_files="fact_recall_bench_v2.jsonl")
print(ds["train"][0])
Or via the GhostLM grader directly:
git clone https://github.com/joemunene-by/GhostLM
cd GhostLM
PYTHONPATH=. python3 scripts/eval_fact_recall_v2.py \
--checkpoints my-model=path/to/checkpoint.pt \
--bench data/raw/fact_recall_bench_v2.jsonl
License
Apache 2.0. Same license as the GhostLM source code.
Citation
@misc{munene2026ghostlm,
title = {GhostLM: a from-scratch cybersecurity language model on a transparent scale ladder},
author = {Munene, Joe},
year = {2026},
howpublished = {\url{https://github.com/joemunene-by/GhostLM}},
note = {Free-form fact-recall benchmark v2; 100-question seed, growing toward 200; ghost-small line scores 0-1\% (floor)}
}
- Downloads last month
- 49