Dataset Viewer
Auto-converted to Parquet Duplicate
id
string
topic
string
prompt
string
answer
string
alternates
list
disqualifiers
list
must_appear
list
fr2-001
cve
What is the CVE identifier for the EternalBlue SMB vulnerability?
CVE-2017-0144
[ "CVE-2017-0144" ]
null
null
fr2-002
cve
What CVE was the Log4Shell vulnerability assigned?
CVE-2021-44228
[ "CVE-2021-44228" ]
null
null
fr2-003
cve
Heartbleed in OpenSSL has which CVE identifier?
CVE-2014-0160
[ "CVE-2014-0160" ]
null
null
fr2-004
cve
What is the CVE for the Shellshock Bash vulnerability?
CVE-2014-6271
[ "CVE-2014-6271" ]
null
null
fr2-005
cve
BlueKeep, the wormable RDP RCE, has which CVE?
CVE-2019-0708
[ "CVE-2019-0708" ]
null
null
fr2-006
cve
What CVE was assigned to the Spring4Shell remote code execution vulnerability?
CVE-2022-22965
[ "CVE-2022-22965" ]
null
null
fr2-007
cve
PrintNightmare in Windows Print Spooler is which CVE?
CVE-2021-34527
[ "CVE-2021-34527", "CVE-2021-1675" ]
null
null
fr2-008
cve
The original Apache Struts2 OGNL injection used in the Equifax breach was which CVE?
CVE-2017-5638
[ "CVE-2017-5638" ]
null
null
fr2-009
cve
What CVE identifies the Dirty COW Linux privilege escalation?
CVE-2016-5195
[ "CVE-2016-5195" ]
null
null
fr2-010
cve
Spectre Variant 1 (bounds check bypass) is tracked as which CVE?
CVE-2017-5753
[ "CVE-2017-5753" ]
null
null
fr2-011
cve
Meltdown (CPU-cache speculative-execution attack) has which CVE?
CVE-2017-5754
[ "CVE-2017-5754" ]
null
null
fr2-012
cve
What CVE is the ProxyShell Exchange Server chain's authentication-bypass component?
CVE-2021-34473
[ "CVE-2021-34473" ]
null
null
fr2-013
cve
What is the CVE for the OpenSSH 'regreSSHion' pre-auth RCE disclosed by Qualys in 2024?
CVE-2024-6387
[ "CVE-2024-6387" ]
null
null
fr2-014
cve
Follina, the Microsoft MSDT zero-click via Office documents, has which CVE?
CVE-2022-30190
[ "CVE-2022-30190" ]
null
null
fr2-015
cve
What CVE covers the F5 BIG-IP iControl REST authentication bypass disclosed in 2022?
CVE-2022-1388
[ "CVE-2022-1388" ]
null
null
fr2-016
cve
What CVE was assigned to the GoAnywhere MFT zero-day exploited by Cl0p in early 2023?
CVE-2023-0669
[ "CVE-2023-0669" ]
null
null
fr2-017
cve
What is the CVE for the MOVEit Transfer SQL injection exploited by Cl0p in mid-2023?
CVE-2023-34362
[ "CVE-2023-34362" ]
null
null
fr2-018
cve
Citrix Bleed (NetScaler ADC information disclosure) has which CVE?
CVE-2023-4966
[ "CVE-2023-4966" ]
null
null
fr2-019
cve
ZeroLogon, the Netlogon cryptographic flaw allowing domain takeover, is which CVE?
CVE-2020-1472
[ "CVE-2020-1472" ]
null
null
fr2-020
cve
What CVE is the Polkit pkexec local privilege escalation known as 'PwnKit'?
CVE-2021-4034
[ "CVE-2021-4034" ]
null
null
fr2-021
cve
What CVE identifies the SolarWinds Orion supply-chain backdoor (SUNBURST) initial-access vulnerability?
CVE-2020-10148
[ "CVE-2020-10148" ]
null
null
fr2-022
cve
What CVE is the Atlassian Confluence OGNL injection from June 2022?
CVE-2022-26134
[ "CVE-2022-26134" ]
null
null
fr2-023
cve
What CVE is the Ivanti Connect Secure / Pulse Secure SSL VPN auth bypass disclosed January 2024?
CVE-2023-46805
[ "CVE-2023-46805" ]
null
null
fr2-024
cve
What CVE pairs with CVE-2023-46805 in the Ivanti chain (the command-injection half)?
CVE-2024-21887
[ "CVE-2024-21887" ]
null
null
fr2-025
cve
What is the CVE for the Apache HTTP Server path-traversal disclosed October 2021?
CVE-2021-41773
[ "CVE-2021-41773" ]
null
null
fr2-026
cve
What CVE describes the Sudo heap overflow disclosed January 2021 (Baron Samedit)?
CVE-2021-3156
[ "CVE-2021-3156" ]
null
null
fr2-027
cve
What CVE identifies the Linux kernel netfilter use-after-free 'StackRot' from July 2023?
CVE-2023-3269
[ "CVE-2023-3269" ]
null
null
fr2-028
cve
What is the CVE for the Microsoft Exchange ProxyLogon SSRF authentication bypass?
CVE-2021-26855
[ "CVE-2021-26855" ]
null
null
fr2-029
cve
What CVE identifies the Cisco IOS XE web UI privilege escalation disclosed October 2023?
CVE-2023-20198
[ "CVE-2023-20198" ]
null
null
fr2-030
cve
What CVE describes the Fortinet FortiOS SSL VPN heap overflow disclosed December 2022?
CVE-2022-42475
[ "CVE-2022-42475" ]
null
null
fr2-031
mitre
What MITRE ATT&CK technique ID is 'Command and Scripting Interpreter'?
T1059
[ "T1059" ]
null
null
fr2-032
mitre
Which MITRE ATT&CK technique covers PowerShell specifically as a sub-technique?
T1059.001
[ "T1059.001" ]
null
null
fr2-033
mitre
What MITRE ATT&CK technique ID is 'Phishing'?
T1566
[ "T1566" ]
null
null
fr2-034
mitre
What MITRE ATT&CK technique covers 'Valid Accounts'?
T1078
[ "T1078" ]
null
null
fr2-035
mitre
What MITRE ATT&CK technique ID is 'OS Credential Dumping'?
T1003
[ "T1003" ]
null
null
fr2-036
mitre
What MITRE ATT&CK technique covers 'Scheduled Task/Job'?
T1053
[ "T1053" ]
null
null
fr2-037
mitre
What MITRE ATT&CK technique ID is 'Lateral Movement via Remote Services'?
T1021
[ "T1021" ]
null
null
fr2-038
mitre
What MITRE ATT&CK tactic does TA0001 represent?
Initial Access
[ "Initial Access" ]
null
null
fr2-039
mitre
What MITRE ATT&CK tactic does TA0003 represent?
Persistence
[ "Persistence" ]
null
null
fr2-040
mitre
What MITRE ATT&CK tactic is TA0010?
Exfiltration
[ "Exfiltration" ]
null
null
fr2-041
mitre
What MITRE ATT&CK technique ID is 'Process Injection'?
T1055
[ "T1055" ]
null
null
fr2-042
mitre
What MITRE ATT&CK technique covers 'Hijack Execution Flow: DLL Side-Loading'?
T1574.002
[ "T1574.002" ]
null
null
fr2-043
mitre
What MITRE ATT&CK technique ID covers 'Exploit Public-Facing Application'?
T1190
[ "T1190" ]
null
null
fr2-044
mitre
What MITRE ATT&CK technique ID is 'Remote Services: SMB/Windows Admin Shares'?
T1021.002
[ "T1021.002" ]
null
null
fr2-045
mitre
What MITRE ATT&CK technique covers 'Application Layer Protocol' for C2 communication?
T1071
[ "T1071" ]
null
null
fr2-046
cwe
What CWE number is 'SQL Injection'?
CWE-89
[ "CWE-89" ]
null
null
fr2-047
cwe
What CWE number is 'Cross-Site Scripting' (Reflected/Stored/DOM general)?
CWE-79
[ "CWE-79" ]
null
null
fr2-048
cwe
What CWE number describes 'Path Traversal'?
CWE-22
[ "CWE-22" ]
null
null
fr2-049
cwe
What CWE number is 'Use of Hard-coded Credentials'?
CWE-798
[ "CWE-798" ]
null
null
fr2-050
cwe
What CWE number describes 'Server-Side Request Forgery (SSRF)'?
CWE-918
[ "CWE-918" ]
null
null
fr2-051
cwe
What CWE number is 'Cross-Site Request Forgery (CSRF)'?
CWE-352
[ "CWE-352" ]
null
null
fr2-052
cwe
What CWE describes 'Improper Restriction of Operations within the Bounds of a Memory Buffer'?
CWE-119
[ "CWE-119" ]
null
null
fr2-053
cwe
What CWE number is 'Use After Free'?
CWE-416
[ "CWE-416" ]
null
null
fr2-054
cwe
What CWE number describes 'NULL Pointer Dereference'?
CWE-476
[ "CWE-476" ]
null
null
fr2-055
cwe
What CWE number is 'Improper Authentication'?
CWE-287
[ "CWE-287" ]
null
null
fr2-056
cwe
What CWE number describes 'Insecure Deserialization' / 'Deserialization of Untrusted Data'?
CWE-502
[ "CWE-502" ]
null
null
fr2-057
cwe
What CWE number is 'OS Command Injection'?
CWE-78
[ "CWE-78" ]
null
null
fr2-058
cwe
What CWE number describes 'Integer Overflow or Wraparound'?
CWE-190
[ "CWE-190" ]
null
null
fr2-059
cwe
What CWE describes 'Use of a Broken or Risky Cryptographic Algorithm'?
CWE-327
[ "CWE-327" ]
null
null
fr2-060
cwe
What CWE number is 'Out-of-bounds Write'?
CWE-787
[ "CWE-787" ]
null
null
fr2-061
owasp
In the OWASP Top 10 2021, what is A01 (the top category)?
Broken Access Control
[ "Broken Access Control", "A01:2021" ]
null
null
fr2-062
owasp
In the OWASP Top 10 2021, what is A03 the category for?
Injection
[ "Injection" ]
null
null
fr2-063
owasp
In the OWASP Top 10 2021, what is A07 the category for?
Identification and Authentication Failures
[ "Identification and Authentication Failures" ]
null
null
fr2-064
owasp
In the OWASP Top 10 2021, what category number is 'Server-Side Request Forgery'?
A10
[ "A10", "A10:2021" ]
[ "A10:2017" ]
null
fr2-065
owasp
In the OWASP API Security Top 10 2023, what is API1 the category for?
Broken Object Level Authorization
[ "Broken Object Level Authorization", "BOLA" ]
null
null
fr2-066
owasp
OWASP ASVS has how many verification levels?
three
[ "three", "3 levels", "Level 1, 2, 3" ]
[ "four levels", "2 levels" ]
null
fr2-067
owasp
What does ASVS stand for?
Application Security Verification Standard
[ "Application Security Verification Standard" ]
null
null
fr2-068
owasp
What is the WSTG (OWASP testing methodology)?
Web Security Testing Guide
[ "Web Security Testing Guide" ]
null
null
fr2-069
owasp
OWASP categorizes 'Cryptographic Failures' under which Top 10 2021 number?
A02
[ "A02", "A02:2021" ]
null
null
fr2-070
owasp
OWASP categorizes 'Insecure Design' under which Top 10 2021 number?
A04
[ "A04", "A04:2021" ]
null
null
fr2-071
crypto
AES-128 uses how many rounds in encryption?
10
[ "10 rounds", "10" ]
[ "12 rounds", "14 rounds" ]
null
fr2-072
crypto
AES-256 uses how many rounds?
14
[ "14 rounds", "14" ]
[ "10 rounds", "12 rounds" ]
null
fr2-073
crypto
What is the output length in bits of SHA-256?
256 bits
null
[ "384 bits", "512 bits" ]
[ "256", "bits" ]
fr2-074
crypto
Which hash algorithm produces a 160-bit digest?
SHA-1
[ "SHA-1", "SHA1" ]
[ "SHA-256", "SHA-512" ]
null
fr2-075
crypto
What block-cipher mode is recommended for authenticated encryption (AEAD) in TLS 1.3?
GCM
[ "GCM", "Galois/Counter Mode", "ChaCha20-Poly1305" ]
null
null
fr2-076
crypto
What is the recommended minimum RSA key size as of NIST SP 800-57?
2048 bits
[ "2048", "RSA 2048" ]
[ "1024 bits", "512 bits" ]
null
fr2-077
crypto
What elliptic curve does Ed25519 use?
Curve25519
[ "Curve25519", "Edwards 25519" ]
null
null
fr2-078
crypto
What is the IV size of AES-GCM in bits?
96 bits
null
[ "128 bit IV", "256 bit IV" ]
[ "96" ]
fr2-079
crypto
PBKDF2 stands for what?
Password-Based Key Derivation Function 2
[ "Password-Based Key Derivation Function", "Password Based Key Derivation Function" ]
null
null
fr2-080
crypto
What KDF was the winner of the Password Hashing Competition?
Argon2
[ "Argon2", "Argon2id" ]
null
null
fr2-081
protocol
What RFC defines TLS 1.3?
RFC 8446
[ "RFC 8446", "8446" ]
null
null
fr2-082
protocol
What RFC defines TLS 1.2?
RFC 5246
[ "RFC 5246", "5246" ]
null
null
fr2-083
protocol
What RFC defines HTTP/2?
RFC 7540
[ "RFC 7540", "7540", "RFC 9113" ]
null
null
fr2-084
protocol
What RFC defines OAuth 2.0?
RFC 6749
[ "RFC 6749", "6749" ]
null
null
fr2-085
protocol
What RFC defines JSON Web Token (JWT)?
RFC 7519
null
null
[ "7519", "JWT" ]
fr2-086
protocol
What RFC defines DKIM (DomainKeys Identified Mail)?
RFC 6376
[ "RFC 6376", "6376" ]
null
null
fr2-087
protocol
What RFC defines DMARC?
RFC 7489
[ "RFC 7489", "7489" ]
null
null
fr2-088
protocol
What is the standard port for SSH?
22
[ "port 22", "TCP 22" ]
[ "port 23", "port 2222" ]
null
fr2-089
protocol
What is the standard port for SMTPS (SMTP over SSL/TLS)?
465
[ "port 465" ]
null
null
fr2-090
protocol
What is the standard port for LDAP over TLS (LDAPS)?
636
[ "port 636" ]
null
null
fr2-091
protocol
What TCP port does Kerberos use?
88
[ "port 88", "TCP 88" ]
null
null
fr2-092
tool
What command-line flag tells Nmap to perform OS fingerprinting?
-O
[ "-O", "--osscan" ]
null
null
fr2-093
tool
What Sysinternals tool dumps process memory by name (used for credential extraction)?
procdump
[ "procdump", "procdump.exe" ]
null
null
fr2-094
tool
What is the default name of the LSASS process whose memory contains Windows credentials?
lsass.exe
[ "lsass.exe", "lsass" ]
null
null
fr2-095
tool
What command lists running services on a Windows host from cmd?
sc query
[ "sc query", "sc.exe query" ]
null
null
fr2-096
tool
What Windows event ID logs a successful logon (NTLM/Kerberos) on a domain controller?
4624
[ "4624", "Event ID 4624" ]
null
null
fr2-097
tool
What Windows event ID indicates a Kerberos service ticket request (TGS-REQ)?
4769
[ "4769", "Event ID 4769" ]
null
null
fr2-098
misc
What is the maximum CVSS v3.1 base score?
10.0
[ "10", "10.0" ]
[ "9.8", "9.0" ]
null
fr2-099
misc
What is the CVSS v3.1 severity band for a base score of 9.0-10.0?
Critical
[ "Critical" ]
null
null
fr2-100
misc
What standard governs PCI DSS as of version 4.0?
PCI DSS 4.0
[ "PCI DSS 4.0", "Payment Card Industry Data Security Standard" ]
null
null

Cybersec Fact-Recall Benchmark (GhostLM v2)

Free-form short-answer benchmark for small cybersecurity language models. Built and used by the GhostLM project as the truth metric for the ghost-base v1.0 acceptance gate.

Why this exists

Multiple-choice cybersec benchmarks like CTIBench and SecQA reward register matching (the model picks the option that "looks like" a security answer) as much as actual factual recall. A small from- scratch model can hit 28-30% on those without knowing a single CVE identifier. Free-form generation strips that crutch away: if the model knows EternalBlue is CVE-2017-0144, it surfaces the ID; if it doesn't, it confabulates a plausible-looking but wrong CVE.

Dataset structure

100-question seed (v2.0; growing toward 200 in subsequent releases):

Topic Count
cve 30
mitre 15
cwe 15
protocol 11
owasp 10
crypto 10
tool 6
misc 3

One JSON object per line with fields:

{
  "id":             "fr2-001",
  "topic":          "cve",
  "prompt":         "What is the CVE identifier for the EternalBlue SMB vulnerability?",
  "answer":         "CVE-2017-0144",
  "alternates":     ["CVE-2017-0144"],
  "boundary_match": true,
  "disqualifiers":  ["EternalBlue"],
  "must_appear":    ["RFC 7519", "JWT"]
}

Every record has id, topic, prompt, answer. The rest is optional; defaults are alternates: [], boundary_match: true, disqualifiers: [], must_appear: [].

Grading semantics

Three schema fields tighten the grader vs naive substring match:

  • boundary_match (default true). Match only when the candidate appears with non-alphanumeric characters on both sides. "10" no longer matches inside "100".
  • disqualifiers. List of phrases that, if present in the completion, void any match credit. Used on echoing-risk questions where the model can surface the answer simply by quoting back the question prompt.
  • must_appear. ALL listed substrings must appear (boundary- matched). Used for composite-fact questions like "what RFC defines JWT?" requiring both "RFC 7519" and "JWT" together.

Reference grader: scripts/eval_fact_recall_v2.py in the GhostLM repo (Apache 2.0). 11 unit tests cover the boundary, disqualifier, and must_appear edge cases.

Baseline numbers (2026-05-07)

GhostLM ghost-small (45-81M parameters) chat checkpoints score at the floor across the board. Greedy generation, 120-token budget, M4 MPS.

Checkpoint Params Hits / 100 Rate Per-topic hit
ghost-small v0.4 chat-v3 45M 0 0.0% (none)
ghost-small v0.7 chat 81M 1 1.0% misc 1/3
ghost-small v0.9 chat 81M 1 1.0% owasp 1/10

The line saturates at the bench floor as expected: at this parameter count the model has the register of cybersec writing but not the facts in any retrievable form. Both v0.7 and v0.9 "hits" are likely spurious echoes of question keywords (the misc topic asks about CVSS bounds; the owasp topic asks about Top-10 labels that appear in many corpus passages). The smart grader doesn't invent false positives but it can't distinguish "knows the fact" from "has seen the substring close to similar prose".

Acceptance criterion

The GhostLM project uses >=30% on this bench as one of three ways the next architectural rung (ghost-base, ~360M parameters) can clear its acceptance gate. If a 360M from-scratch model hits 30%+ free-form fact recall on cybersec questions, that validates the parameter-scaling hypothesis. The other two gates are CTIBench full

=40% and the in-repo CTF MCQ >=65%.

Loading

from datasets import load_dataset
ds = load_dataset("Ghostgim/cybersec-fact-recall", data_files="fact_recall_bench_v2.jsonl")
print(ds["train"][0])

Or via the GhostLM grader directly:

git clone https://github.com/joemunene-by/GhostLM
cd GhostLM
PYTHONPATH=. python3 scripts/eval_fact_recall_v2.py \
    --checkpoints my-model=path/to/checkpoint.pt \
    --bench data/raw/fact_recall_bench_v2.jsonl

License

Apache 2.0. Same license as the GhostLM source code.

Citation

@misc{munene2026ghostlm,
  title         = {GhostLM: a from-scratch cybersecurity language model on a transparent scale ladder},
  author        = {Munene, Joe},
  year          = {2026},
  howpublished  = {\url{https://github.com/joemunene-by/GhostLM}},
  note          = {Free-form fact-recall benchmark v2; 100-question seed, growing toward 200; ghost-small line scores 0-1\% (floor)}
}
Downloads last month
49