squ11z1 commited on
Commit
2981625
·
verified ·
1 Parent(s): 805ac77

Update README.md with full model card

Browse files
Files changed (1) hide show
  1. README.md +98 -3
README.md CHANGED
@@ -1,8 +1,103 @@
1
  ---
2
  license: apache-2.0
3
- tags: [cybersecurity, security, vulnerability-analysis]
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
4
  ---
5
 
6
- # Mythoseek
7
 
8
- Mythoseek is a cybersecurity AI assistant created by squ11z1, built on the DeepSeek-V4 Pro architecture.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
  ---
2
  license: apache-2.0
3
+ language:
4
+ - en
5
+ tags:
6
+ - transformers
7
+ - safetensors
8
+ - text-generation
9
+ - cybersecurity
10
+ - penetration-testing
11
+ - vulnerability-research
12
+ - osint
13
+ - cwe
14
+ - tool-use
15
+ - reasoning
16
+ - chain-of-thought
17
+ - grpo
18
+ - quantum-classical
19
+ - kaon
20
+ - ibm-quantum
21
+ - aer
22
+ - merlin-research
23
+ - qwen3_5
24
+ base_model: Qwen/Qwen3.5-9B-Base
25
+ base_model_relation: finetune
26
+ pipeline_tag: text-generation
27
  ---
28
 
29
+ # Mythoseek-10B
30
 
31
+ **squ11z1 · Merlin Research**
32
+
33
+ > *Mythos* — after Claude Mythos, Anthropic's frontier cyber model.
34
+ > *Seek* — after DeepSeek, the open-source movement.
35
+ > **Mythoseek**: the open alternative.
36
+
37
+ ---
38
+
39
+ ## Overview
40
+
41
+ Mythoseek-10B is a 10B parameter language model specialized for
42
+ cybersecurity — vulnerability research, penetration testing, OSINT,
43
+ and CWE-pattern reasoning. Fine-tuned from Qwen/Qwen3.5-9B-Base on
44
+ confidential enterprise pentest reports and frontier model distillation
45
+ traces, it brings closed-source cyber AI capability to the open
46
+ community.
47
+
48
+ Developed at **Merlin Research** (Stockholm, Sweden) as part of the
49
+ **KAON** quantum-classical research program — a closed-loop framework
50
+ connecting IBM Quantum (ibm_kingston, Heron r2) with edge LLM
51
+ inference on Apple Silicon. OTOC scrambling measurements from real
52
+ IBM QPU jobs informed AER (Adaptive Entropy Regularization)
53
+ coefficient calibration during GRPO training.
54
+
55
+ ---
56
+
57
+ ## Training Pipeline
58
+
59
+ | Stage | Method | Details |
60
+ |---|---|---|
61
+ | 1 | SFT Distillation | Frontier model trace distillation |
62
+ | 2 | GRPO / RL | Verifiable rewards on cyber tasks |
63
+ | 3 | Tool-use SFT | Agent-style tool calling |
64
+ | 4 | CWE Grounding | CWE-pattern structured reasoning |
65
+
66
+ ---
67
+
68
+ ## CyberGym Results (arXiv:2506.02548)
69
+
70
+ **CyberGym** — UC Berkeley's large-scale cybersecurity benchmark,
71
+ 1,507 real-world vulnerabilities from Google OSS-Fuzz across 188
72
+ projects. No partial credit, no LLM judge — pass requires a valid
73
+ PoC that crashes the pre-patch build.
74
+
75
+ | Level | Scaffold | pass@4 |
76
+ |---|---|---|
77
+ | Level 0 | Full scaffolding | 62% |
78
+ | Level 1 | Partial scaffolding | 34% |
79
+ | Level 2 | Minimal scaffolding | 12% |
80
+ | Level 3 | No scaffolding | 3% |
81
+
82
+ > For reference: Claude Mythos Preview leads the public leaderboard
83
+ > at 83.1% pass@1 (overall, closed model).
84
+ > Mythoseek-10B is a 10B open-weight alternative.
85
+
86
+ ---
87
+
88
+ ## Intended Use
89
+
90
+ - Vulnerability research and CVE analysis
91
+ - Penetration testing assistance (OSINT, recon, XSS, SQLi)
92
+ - CWE classification and pattern recognition
93
+ - Security report generation
94
+ - Red team reasoning support
95
+
96
+ **Not intended for:** autonomous offensive operations,
97
+ unauthorized access, or malicious use.
98
+
99
+ ---
100
+
101
+ ## KAON Connection
102
+
103
+ This model is part of the **KAON** quantum-classical research program: