Spaces:
Sleeping
Sleeping
Update blog/blog.md
Browse files- blog/blog.md +1 -2
blog/blog.md
CHANGED
|
@@ -14,7 +14,7 @@ So I built **CyberSecurity_OWASP** around that idea:
|
|
| 14 |
|
| 15 |
> If frontier models can scale vulnerability discovery, small RL-trained defenders should scale **vulnerability prevention**.
|
| 16 |
|
| 17 |
-
The goal is an OpenEnv environment where a small open model ( in this case **Gemma 4 E2B**) can learn an actual defensive workflow: inspect an application, understand the intended authorization policy, discover a broken access control bug, patch the code, and preserve legitimate behavior.
|
| 18 |
|
| 19 |
## Why OWASP A01?
|
| 20 |
|
|
@@ -50,7 +50,6 @@ inspect generated app + policy
|
|
| 50 |
|
| 51 |
The current MVP focuses on generated FastAPI-style invoice applications with injected OWASP A01 BOLA/IDOR defects. The agent must inspect the app, compare identities, use safe local requests, diagnose the bug, patch the vulnerable route or service code, run visible checks, and submit a final fix.
|
| 52 |
|
| 53 |
-
This is not a static multiple-choice benchmark. It is an interactive environment with tools, state, hidden checks, and reward feedback.
|
| 54 |
|
| 55 |
## Architecture and Training Flow
|
| 56 |
|
|
|
|
| 14 |
|
| 15 |
> If frontier models can scale vulnerability discovery, small RL-trained defenders should scale **vulnerability prevention**.
|
| 16 |
|
| 17 |
+
The goal is an OpenEnv environment where a **small open model** ( in this case **Gemma 4 E2B**) can learn an actual defensive workflow: inspect an application, understand the intended authorization policy, discover a broken access control bug, patch the code, and preserve legitimate behavior.
|
| 18 |
|
| 19 |
## Why OWASP A01?
|
| 20 |
|
|
|
|
| 50 |
|
| 51 |
The current MVP focuses on generated FastAPI-style invoice applications with injected OWASP A01 BOLA/IDOR defects. The agent must inspect the app, compare identities, use safe local requests, diagnose the bug, patch the vulnerable route or service code, run visible checks, and submit a final fix.
|
| 52 |
|
|
|
|
| 53 |
|
| 54 |
## Architecture and Training Flow
|
| 55 |
|