Update README.md with full model card
Browse files
README.md
CHANGED
|
@@ -1,8 +1,103 @@
|
|
| 1 |
---
|
| 2 |
license: apache-2.0
|
| 3 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 4 |
---
|
| 5 |
|
| 6 |
-
# Mythoseek
|
| 7 |
|
| 8 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
---
|
| 2 |
license: apache-2.0
|
| 3 |
+
language:
|
| 4 |
+
- en
|
| 5 |
+
tags:
|
| 6 |
+
- transformers
|
| 7 |
+
- safetensors
|
| 8 |
+
- text-generation
|
| 9 |
+
- cybersecurity
|
| 10 |
+
- penetration-testing
|
| 11 |
+
- vulnerability-research
|
| 12 |
+
- osint
|
| 13 |
+
- cwe
|
| 14 |
+
- tool-use
|
| 15 |
+
- reasoning
|
| 16 |
+
- chain-of-thought
|
| 17 |
+
- grpo
|
| 18 |
+
- quantum-classical
|
| 19 |
+
- kaon
|
| 20 |
+
- ibm-quantum
|
| 21 |
+
- aer
|
| 22 |
+
- merlin-research
|
| 23 |
+
- qwen3_5
|
| 24 |
+
base_model: Qwen/Qwen3.5-9B-Base
|
| 25 |
+
base_model_relation: finetune
|
| 26 |
+
pipeline_tag: text-generation
|
| 27 |
---
|
| 28 |
|
| 29 |
+
# Mythoseek-10B
|
| 30 |
|
| 31 |
+
**squ11z1 · Merlin Research**
|
| 32 |
+
|
| 33 |
+
> *Mythos* — after Claude Mythos, Anthropic's frontier cyber model.
|
| 34 |
+
> *Seek* — after DeepSeek, the open-source movement.
|
| 35 |
+
> **Mythoseek**: the open alternative.
|
| 36 |
+
|
| 37 |
+
---
|
| 38 |
+
|
| 39 |
+
## Overview
|
| 40 |
+
|
| 41 |
+
Mythoseek-10B is a 10B parameter language model specialized for
|
| 42 |
+
cybersecurity — vulnerability research, penetration testing, OSINT,
|
| 43 |
+
and CWE-pattern reasoning. Fine-tuned from Qwen/Qwen3.5-9B-Base on
|
| 44 |
+
confidential enterprise pentest reports and frontier model distillation
|
| 45 |
+
traces, it brings closed-source cyber AI capability to the open
|
| 46 |
+
community.
|
| 47 |
+
|
| 48 |
+
Developed at **Merlin Research** (Stockholm, Sweden) as part of the
|
| 49 |
+
**KAON** quantum-classical research program — a closed-loop framework
|
| 50 |
+
connecting IBM Quantum (ibm_kingston, Heron r2) with edge LLM
|
| 51 |
+
inference on Apple Silicon. OTOC scrambling measurements from real
|
| 52 |
+
IBM QPU jobs informed AER (Adaptive Entropy Regularization)
|
| 53 |
+
coefficient calibration during GRPO training.
|
| 54 |
+
|
| 55 |
+
---
|
| 56 |
+
|
| 57 |
+
## Training Pipeline
|
| 58 |
+
|
| 59 |
+
| Stage | Method | Details |
|
| 60 |
+
|---|---|---|
|
| 61 |
+
| 1 | SFT Distillation | Frontier model trace distillation |
|
| 62 |
+
| 2 | GRPO / RL | Verifiable rewards on cyber tasks |
|
| 63 |
+
| 3 | Tool-use SFT | Agent-style tool calling |
|
| 64 |
+
| 4 | CWE Grounding | CWE-pattern structured reasoning |
|
| 65 |
+
|
| 66 |
+
---
|
| 67 |
+
|
| 68 |
+
## CyberGym Results (arXiv:2506.02548)
|
| 69 |
+
|
| 70 |
+
**CyberGym** — UC Berkeley's large-scale cybersecurity benchmark,
|
| 71 |
+
1,507 real-world vulnerabilities from Google OSS-Fuzz across 188
|
| 72 |
+
projects. No partial credit, no LLM judge — pass requires a valid
|
| 73 |
+
PoC that crashes the pre-patch build.
|
| 74 |
+
|
| 75 |
+
| Level | Scaffold | pass@4 |
|
| 76 |
+
|---|---|---|
|
| 77 |
+
| Level 0 | Full scaffolding | 62% |
|
| 78 |
+
| Level 1 | Partial scaffolding | 34% |
|
| 79 |
+
| Level 2 | Minimal scaffolding | 12% |
|
| 80 |
+
| Level 3 | No scaffolding | 3% |
|
| 81 |
+
|
| 82 |
+
> For reference: Claude Mythos Preview leads the public leaderboard
|
| 83 |
+
> at 83.1% pass@1 (overall, closed model).
|
| 84 |
+
> Mythoseek-10B is a 10B open-weight alternative.
|
| 85 |
+
|
| 86 |
+
---
|
| 87 |
+
|
| 88 |
+
## Intended Use
|
| 89 |
+
|
| 90 |
+
- Vulnerability research and CVE analysis
|
| 91 |
+
- Penetration testing assistance (OSINT, recon, XSS, SQLi)
|
| 92 |
+
- CWE classification and pattern recognition
|
| 93 |
+
- Security report generation
|
| 94 |
+
- Red team reasoning support
|
| 95 |
+
|
| 96 |
+
**Not intended for:** autonomous offensive operations,
|
| 97 |
+
unauthorized access, or malicious use.
|
| 98 |
+
|
| 99 |
+
---
|
| 100 |
+
|
| 101 |
+
## KAON Connection
|
| 102 |
+
|
| 103 |
+
This model is part of the **KAON** quantum-classical research program:
|