File size: 22,284 Bytes
e520bf1
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
---
license: cc-by-nc-4.0
library_name: pytorch
tags:
  - cybersecurity
  - vulnerability-management
  - cve
  - cvss
  - epss
  - cisa-kev
  - tabular-classification
  - synthetic-data
  - xgboost
  - baseline
  - leakage-diagnostic
  - data-quality-audit
pipeline_tag: tabular-classification
base_model: []
datasets:
  - xpertsystems/cyb009-sample
metrics:
  - accuracy
  - f1
  - roc_auc
model-index:
  - name: cyb009-baseline-classifier
    results:
      - task:
          type: tabular-classification
          name: 8-class vulnerability classification (CWE-style families)
        dataset:
          type: xpertsystems/cyb009-sample
          name: CYB009 Synthetic Vulnerability Intelligence Dataset (Sample)
        metrics:
          - type: roc_auc
            value: 0.6837
            name: Test macro ROC-AUC OvR (XGBoost, seed 42)
          - type: accuracy
            value: 0.2374
            name: Test accuracy (XGBoost, seed 42)
          - type: f1
            value: 0.2244
            name: Test macro-F1 (XGBoost, seed 42)
          - type: accuracy
            value: 0.244
            name: Multi-seed accuracy mean ± 0.023 (XGBoost, 10 seeds)
          - type: roc_auc
            value: 0.687
            name: Multi-seed ROC-AUC mean ± 0.014 (XGBoost, 10 seeds)
---

# CYB009 Baseline Classifier

**Vulnerability classification baseline (8-class) trained on the CYB009
synthetic vulnerability intelligence sample. The primary artifact value
of this repo is `leakage_diagnostic.json` — the most comprehensive
structural-leakage audit in the XpertSystems baseline catalog,
documenting 8 oracle paths and 6 unlearnable README-suggested targets.
The classifier itself is the catalog's weakest baseline by design (acc
0.244 vs majority 0.176), included to show that vulnerability_class is
the ONLY README-headline target that learns honestly on this sample.**

> **Read this first.** This repo ships three artifacts in priority
> order:
> 1. **`leakage_diagnostic.json`** — comprehensive audit of 8 oracle
>    paths discovered on CYB009 and 6 README-suggested targets that
>    are unlearnable on the sample after honest leak removal.
> 2. A working classifier for `vulnerability_class` 8-class — the
>    only README target that learns honestly on this sample, and the
>    weakest baseline in the XpertSystems catalog by design.
> 3. A feature engineering reference (`feature_engineering.py`).
>
> If you came here looking for a strong baseline, you will be
> disappointed. If you came here to understand why the CYB009 sample
> has hard-to-detect structural label-feature determinism, the
> diagnostic is exactly the artifact you need.

## Model overview

| Property | Value |
|---|---|
| Primary task | 8-class `vulnerability_class` classification (CWE-style families) |
| Primary artifact | **`leakage_diagnostic.json`** — 8 oracle paths + 6 unlearnable targets |
| Training data | `xpertsystems/cyb009-sample` (2,638 vulnerabilities) |
| Models | XGBoost + PyTorch MLP |
| Input features | 57 (after one-hot encoding) |
| Split | Stratified random (per-vulnerability, no group structure to leak) |
| Validation | Single seed (artifact) + multi-seed aggregate across 10 seeds |
| License | CC-BY-NC-4.0 (matches dataset) |
| Status | Reference baseline + comprehensive leakage diagnostic |

## Why this task — and the journey to get here

The CYB009 README lists 11 suggested use cases. We piloted every
README-headline target and found pervasive structural leakage. The
abandoned candidates, in order of how we discovered them:

### Initial candidate: `exploit_maturity_final` 4-class (ABANDONED)

The most natural target — 4-class (unproven/PoC/functional/weaponised),
n=2638 well-balanced (36/27/25/12%), maps directly to EPSS calibration.
Initial feasibility hit **acc 0.74, macro-F1 0.72, ROC-AUC 0.91 vs
majority 0.36** — a +38pp lift looked excellent.

**Then we found the leak.** `cvss_temporal_score_final` divided by
`cvss_base_score` clusters near-deterministically per maturity tier:

| Maturity tier | Observed ratio (median ± std) | CVSS v3.1 multiplier |
|---|---:|---:|
| unproven | 0.801 ± 0.011 | 0.91 × (other Temporal factors) |
| proof_of_concept | 0.827 ± 0.011 | 0.94 × (other Temporal factors) |
| functional | 0.854 ± 0.011 | 0.97 × (other Temporal factors) |
| weaponised | 0.880 ± 0.012 | 1.00 × (other Temporal factors) |

This is exactly the CVSS v3.1 Exploit Code Maturity multiplier
(unproven 0.91 / PoC 0.94 / functional 0.97 / high or weaponised 1.00),
combined with other near-constant Temporal factors (Remediation Level,
Report Confidence). **The cvss_temporal/cvss_base ratio uniquely
identifies the maturity tier.**

Drop `cvss_temporal_score_final` → accuracy collapses to **0.31**
(below majority 0.36). The target is structurally unlearnable on the
sample once the oracle is removed.

### Other 5 candidates: also unlearnable after honest leak removal

| Target | n_positive | Maj baseline | Honest acc | Honest AUC | Verdict |
|---|---:|---:|---:|---:|---|
| `exploitation_occurred_flag` | 203 | 0.923 | 0.857 | 0.65 | Below majority |
| `zero_day_flag` | 76 | 0.971 | 0.949 | 0.60 | Below majority |
| `cisa_kev_flag` | 14 | 0.995 | 0.992 | 0.61 | Below majority |
| `supply_chain_propagation_flag` | 20 | 0.992 | 0.992 | 0.80 | Below majority |
| `false_positive_flag` | 205 | 0.922 | 0.866 | 0.52 | Below majority |

All five rare-event binaries are oracled by `time_to_exploit_days`
(-1 sentinel) or `time_to_remediate_days` (120 sentinel) at full
features; after honest leak removal, all are at-or-below majority.

### Per-timestep multi-class targets: state-machine oracles

`lifecycle_phase`, `patch_status`, and `remediation_status` on
`vulnerability_records.csv` form a tightly-coupled state machine:
- `lifecycle_phase = residual_risk_review` → 100% `remediated`
- `lifecycle_phase = discovery` → 100% `undetected`
- `lifecycle_phase = remediation_deployment` → 100% `in_remediation`
- `patch_status = deployed` → 100% `remediated`

Naive evaluation on these targets reaches accuracy 0.95-0.98, but any
two of the three deterministically pin the third. None of these is a
viable independent ML target on the sample.

### `severity_class`: 100% mechanical CVSS function

Observed `cvss_base_score` ranges per severity match CVSS v3.1 exactly:
critical [9.0, 10.0], high [7.0, 9.0], medium [4.0, 7.0], low [1.8, 4.0].
Predicting severity is trivial with CVSS; below majority (acc 0.55 vs
0.51) without it.

### `vulnerability_class` 8-class: the only honest target — and the baseline ships

After exhausting the README-suggested targets, `vulnerability_class`
is the only one that learns honestly:
- **acc 0.244 ± 0.023, macro-F1 0.230 ± 0.024, ROC-AUC 0.687 ± 0.014**
- **+7pp lift over majority** (the catalog's smallest)
- **All 8 classes represented** (per-class F1 0.09-0.33)
- **No oracle feature** — modest signal genuinely spread across CVSS,
  EPSS, asset context, and binary flags

This is the **weakest baseline in the XpertSystems catalog by design**.
The full ~487k-row product would tighten per-class signal materially.
The dataset roadmap recommendations in `leakage_diagnostic.json`
describe what would make CYB009's headline targets viable on the
sample.

## Quick start

```bash
pip install xgboost torch safetensors pandas huggingface_hub
```

```python
from huggingface_hub import hf_hub_download, snapshot_download
import json, numpy as np, torch, xgboost as xgb
from safetensors.torch import load_file

REPO = "xpertsystems/cyb009-baseline-classifier"

paths = {n: hf_hub_download(REPO, n) for n in [
    "model_xgb.json", "model_mlp.safetensors",
    "feature_engineering.py", "feature_meta.json", "feature_scaler.json",
]}

import sys, os
sys.path.insert(0, os.path.dirname(paths["feature_engineering.py"]))
from feature_engineering import (
    transform_single, load_meta, build_asset_lookup, INT_TO_LABEL,
)

meta = load_meta(paths["feature_meta.json"])

# Asset features are joined from asset_inventory.csv at inference time
ds = snapshot_download("xpertsystems/cyb009-sample", repo_type="dataset")
asset_lookup = build_asset_lookup(f"{ds}/asset_inventory.csv")

xgb_model = xgb.XGBClassifier(); xgb_model.load_model(paths["model_xgb.json"])

# Predict (see inference_example.ipynb for the full pattern)
# Note: do NOT include exploit_maturity_final, cvss_temporal_score_final,
# time_to_exploit_days, time_to_remediate_days, patch_lag_days, or
# risk_score_composite - those were the outcome-leak columns.
X = transform_single(my_vuln_record, meta, asset_lookup=asset_lookup)
proba = xgb_model.predict_proba(X)[0]
print(INT_TO_LABEL[int(np.argmax(proba))])
```

See [`inference_example.ipynb`](./inference_example.ipynb) for the full
copy-paste demo.

## Training data

Trained on the public sample of CYB009, 2,638 per-vulnerability records:

| Vulnerability class | Vulns | Class share |
|---|---:|---:|
| `memory_corruption` | 465 | 17.6% |
| `injection_family` | 436 | 16.5% |
| `misconfiguration` | 435 | 16.5% |
| `auth_access_control` | 350 | 13.3% |
| `cryptographic_failure` | 301 | 11.4% |
| `supply_chain_weakness` | 271 | 10.3% |
| `logic_flaw` | 228 | 8.6% |
| `information_disclosure` | 152 | 5.8% |

### Stratified split

Per-vulnerability task (one row per vuln in `vuln_summary.csv`),
**StratifiedShuffleSplit** nested 70/15/15:

| Fold | Vulns |
|---|---:|
| Train | 1,846 |
| Validation | 396 |
| Test | 396 |

Class imbalance addressed with `class_weight='balanced'` (XGBoost
`sample_weight`) and weighted cross-entropy (MLP).

## Feature pipeline

The bundled `feature_engineering.py` is the canonical recipe. 57
features survive after encoding, drawn from:

- **Per-vulnerability numeric** (10): `cvss_base_score`,
  `epss_score_final`, plus 8 binary post-hoc flags
- **Per-vulnerability categorical** (1, one-hot): `severity_class`
  (4 values, CVSS-derived but useful as feature)
- **Asset features** (joined from `asset_inventory.csv`): 8 numeric
  + 4 categorical (asset_type, criticality_tier, environment_type,
  os_family)
- **Engineered** (5): `log_epss`, `is_high_cvss`,
  `exposure_severity_composite`, `risk_flag_count`, `epss_x_base`

### Excluded columns (outcome leaks)

| Column | Why excluded |
|---|---|
| `exploit_maturity_final` | Indirect leak via CVSS temporal multiplier (would reintroduce the 0.91/0.94/0.97/1.00 oracle) |
| `cvss_temporal_score_final` | Near-deterministic per `exploit_maturity_final` tier (the primary leak we discovered) |
| `time_to_exploit_days` | -1 sentinel oracle for `exploitation_occurred_flag` |
| `time_to_remediate_days` | 120 sentinel oracle for `remediation_success_flag` |
| `patch_lag_days` | Suspected similar sentinel (precaution) |
| `risk_score_composite` | Computed from flag fields (indirect oracle) |

## Evaluation

### Test-set metrics, seed 42 (n = 396 vulnerabilities)

**XGBoost** (the published `model_xgb.json` artifact)

| Metric | Value |
|---|---:|
| Macro ROC-AUC (OvR) | **0.6837** |
| Accuracy | **0.2374** |
| Macro-F1 | 0.2244 |
| Weighted-F1 | 0.2407 |

**MLP** (the published `model_mlp.safetensors` artifact)

| Metric | Value |
|---|---:|
| Macro ROC-AUC (OvR) | **0.6899** |
| Accuracy | **0.2323** |
| Macro-F1 | 0.2209 |
| Weighted-F1 | 0.2362 |

MLP and XGBoost are within noise of each other on this task — both
are publishing the same modest honest signal.

### Multi-seed robustness (XGBoost, 10 seeds)

| Metric | Mean | Std | Min | Max |
|---|---:|---:|---:|---:|
| Accuracy | 0.244 | 0.023 | 0.217 | 0.283 |
| Macro-F1 | 0.230 | 0.024 | 0.206 | 0.280 |
| Macro ROC-AUC OvR | 0.687 | 0.014 | 0.660 | 0.700 |

All 10 seeds yielded all 8 classes in the test fold (stratified split
guarantees this). Full per-seed results in
[`multi_seed_results.json`](./multi_seed_results.json).

### Per-class F1 (seed 42)

| Vulnerability class | Class share | XGBoost F1 | MLP F1 |
|---|---:|---:|---:|
| `memory_corruption` | 17.6% | **0.333** | 0.365 |
| `information_disclosure` | 5.8% | 0.291 | 0.154 |
| `misconfiguration` | 16.5% | 0.259 | 0.162 |
| `injection_family` | 16.5% | 0.237 | 0.235 |
| `supply_chain_weakness` | 10.3% | 0.222 | 0.292 |
| `cryptographic_failure` | 11.4% | 0.217 | 0.168 |
| `auth_access_control` | 13.3% | 0.146 | 0.163 |
| `logic_flaw` | 8.6% | **0.090** | 0.228 |

`memory_corruption` (highest mean CVSS at 8.3) and
`information_disclosure` (lowest mean CVSS at 5.4) are the most
distinctive classes. `logic_flaw` is the hardest — its feature
distribution overlaps closely with everything else.

### Ablation: which feature groups matter

| Configuration | Accuracy | Macro-F1 | ROC-AUC | Δ accuracy |
|---|---:|---:|---:|---:|
| Full feature set (published) | 0.2374 | 0.2244 | 0.6837 | — |
| No CVSS features | 0.2121 | 0.1926 | 0.6690 | **−0.0253** |
| No asset features | 0.2172 | 0.1967 | 0.6870 | −0.0202 |
| No engineered features | 0.2323 | 0.2216 | 0.6871 | −0.0051 |
| No severity (one-hot) | 0.2273 | 0.2175 | 0.6857 | −0.0101 |
| No EPSS features | 0.2475 | 0.2237 | 0.6926 | +0.0101 |
| No binary flags | 0.2273 | 0.2114 | 0.6776 | −0.0101 |

Three findings:

1. **No feature group is dominant.** Largest single drop is 2.5pp
   (CVSS features). Every group contributes a little; nothing
   contributes a lot. The signal is genuinely diffuse.
2. **CVSS and asset features carry the most signal** (~2pp each),
   consistent with the observation that per-class CVSS means
   differ (5.4 to 8.3) and asset features modestly inform class.
3. **EPSS features slightly *hurt*** on this task (+1pp without
   them). EPSS is intended for exploitation prediction, not class
   prediction; on this sample it acts as small additional noise.

### Architecture

**XGBoost:** multi-class gradient boosting (`multi:softprob`, 8 classes),
`hist` tree method, class-balanced sample weights, early stopping on
validation mlogloss.

**MLP:** `57 → 128 → 64 → 8`, each hidden layer followed by
`BatchNorm1d``ReLU``Dropout(0.3)`, weighted cross-entropy loss,
AdamW optimizer, early stopping on validation macro-F1.

Training hyperparameters are held internally by XpertSystems.

## Limitations

**This is a baseline reference, not a production vulnerability
classifier.**

1. **The headline finding is the leakage diagnostic, not the
   classifier.** Read `leakage_diagnostic.json` first. The classifier
   demonstrates that vulnerability_class is the only README-suggested
   target that learns honestly on the sample.

2. **Per-class F1 ranges 0.09–0.33.** The model is more confident on
   memory_corruption and information_disclosure than on logic_flaw
   and auth_access_control. For production use, expect different
   error patterns by class.

3. **No feature group contributes more than 3pp accuracy.** The
   model has no single decisive signal; instead it integrates many
   weakly-informative features. Removing any one group has minimal
   impact.

4. **Synthetic-vs-real transfer.** The dataset is synthetic, calibrated
   to 12 benchmarks from authoritative vulnerability intelligence
   sources (NIST NVD, EPSS v3, CISA KEV, Mandiant, Verizon DBIR,
   Rapid7, Qualys, Tenable). Real vulnerability telemetry has
   different noise characteristics — in particular, the
   structural-oracle patterns documented in
   `leakage_diagnostic.json` (CVSS temporal multipliers,
   sentinel-coded time fields, lifecycle state-machine determinism)
   would not be present in real data with comparable density. Real
   data has stochastic transitions and observation noise.

5. **2,638 vulnerabilities is a modest training set for 8 classes.**
   The 396-vulnerability test fold yields stable multi-seed metrics
   (std 0.023) but per-class confidence intervals are wide. The full
   ~487k-row product has materially more data per class.

## Notes on dataset schema

The CYB009 sample dataset README describes some fields differently
from the actual schema. This note helps buyers reconcile what they
read with what they receive.

| What the README says | What the data actually contains |
|---|---|
| `vulnerability_records` has 19 columns | Data has **16 columns** |
| `vulnerability_records` includes `severity`, `exploited_in_wild_flag`, `cisa_kev_listed_flag`, `zero_day_flag`, `supply_chain_flag`, `internet_exposed`, `sla_breached_flag` | **None of these columns exist** in vulnerability_records. Per-vuln flags are only on vuln_summary. |
| `vuln_class` has 10 values (incl. `race_condition`, `web_application`, `configuration`) | **8 values** in the data; differs in: `misconfiguration` (not `configuration`), `auth_access_control` (not `authentication_bypass`), `logic_flaw` (new); no `race_condition`, no `web_application`, no `deserialization` |
| 8 lifecycle phases | **12 phases** in the data, adding `residual_risk_review` (45% of all rows), `false_positive_closed`, `sla_breach`, `accepted_risk`, `discovery`, `organisational_triage`, `exploitation_in_wild` |
| `patch_status` has 4 values | **6 values** in the data: adds `vendor_notified`, `patch_in_development`, `patch_validated` |
| `severity` has 5 values (incl. `none`) | **4 values** in the data (`severity_class`): low, medium, high, critical only |
| `vuln_summary` has 15 columns | Data has **21 columns** |
| Field renames | `severity_final``severity_class`; `cvss_base_score_final``cvss_base_score`; `cisa_kev_listed``cisa_kev_flag`; `exploited_in_wild``exploitation_occurred_flag`; `supply_chain_compromise``supply_chain_propagation_flag` |
| Semantic inversion | README's `sla_breached` (True = bad) ↔ data's `sla_compliance_flag` (True = good) |
| `remediation_outcome` categorical (patched/mitigated/accepted/unpatched) | Replaced with `remediation_success_flag` (binary) plus per-timestep `remediation_status` |
| Not in README | New fields: `risk_score_composite`, `compensating_control_flag`, `time_to_exploit_days`, `time_to_remediate_days`, `patch_lag_days` |

None of these affects model correctness — the feature pipeline uses
the actual column names. If you build your own pipeline against the
dataset, use the actual columns.

## Intended use

- **Reading the leakage diagnostic** — the primary value of this repo.
  Reusable methodology for any synthetic vulnerability dataset.
- **Evaluating fit** of the CYB009 dataset for your research, with
  open knowledge of the structural-oracle patterns
- **Honest baseline reference** for the only README-suggested target
  that learns on the sample
- **Feature engineering reference** for per-vulnerability ML

## Out-of-scope use

- **Production vulnerability triage** on real telemetry
- **Exploit maturity prediction** — README headline target,
  unlearnable on the sample after honest leak removal
- **Zero-day / KEV / supply-chain prediction** — README headline
  targets, unlearnable as rare-event binaries on the sample
- **SLA breach prediction** — README headline target, unlearnable
  after honest leak removal
- Any operational security decision without further validation on
  real data

## Reproducibility

Outputs above were produced with `seed = 42` (published artifact),
nested `StratifiedShuffleSplit` (70/15/15), on the published sample
(`xpertsystems/cyb009-sample`, version 1.0.0, generated 2026-05-16).
The feature pipeline in `feature_engineering.py` is deterministic and
the trained weights in this repo correspond exactly to the metrics
above.

Multi-seed results (seeds 42, 7, 13, 17, 23, 31, 45, 99, 123, 200)
in `multi_seed_results.json` confirm robust performance across splits
(std 0.023 on accuracy).

The training script itself is private to XpertSystems.

## Files in this repo

| File | Purpose |
|---|---|
| **`leakage_diagnostic.json`** | **PRIMARY ARTIFACT — 8 oracle paths + 6 unlearnable targets** |
| `model_xgb.json` | XGBoost weights (seed 42) |
| `model_mlp.safetensors` | PyTorch MLP weights (seed 42) |
| `feature_engineering.py` | Feature pipeline |
| `feature_meta.json` | Feature column order + categorical levels |
| `feature_scaler.json` | MLP input mean/std (XGBoost ignores) |
| `validation_results.json` | Per-class metrics, confusion matrix, architecture |
| `ablation_results.json` | Per-feature-group ablation |
| `multi_seed_results.json` | XGBoost metrics across 10 seeds |
| `inference_example.ipynb` | End-to-end inference demo notebook |
| `README.md` | This file |

## Contact and full product

The full **CYB009** dataset contains **~487,000 vulnerability records**
across four files, with calibrated benchmark validation against 12
metrics drawn from authoritative vulnerability intelligence sources
(NIST NVD, EPSS v3, CISA KEV, Mandiant, Verizon DBIR, Rapid7, Qualys,
Tenable). The full XpertSystems.ai synthetic data catalogue spans 41
SKUs across Cybersecurity, Healthcare, Insurance & Risk, Oil & Gas,
and Materials & Energy.

- 📧 **pradeep@xpertsystems.ai**
- 🌐 **https://xpertsystems.ai**
- 🗂  Dataset: https://huggingface.co/datasets/xpertsystems/cyb009-sample
- 🤖 Companion models:
  - https://huggingface.co/xpertsystems/cyb001-baseline-classifier (network traffic)
  - https://huggingface.co/xpertsystems/cyb002-baseline-classifier (ATT&CK kill-chain)
  - https://huggingface.co/xpertsystems/cyb003-baseline-classifier (malware execution phase)
  - https://huggingface.co/xpertsystems/cyb004-baseline-classifier (phishing campaign phase)
  - https://huggingface.co/xpertsystems/cyb005-baseline-classifier (ransomware actor-tier attribution)
  - https://huggingface.co/xpertsystems/cyb006-baseline-classifier (user risk tier + leakage diagnostic)
  - https://huggingface.co/xpertsystems/cyb007-baseline-classifier (insider threat type)
  - https://huggingface.co/xpertsystems/cyb008-baseline-classifier (SOC alert triage + leakage diagnostic)

## Citation

```bibtex
@misc{xpertsystems_cyb009_baseline_2026,
  title  = {CYB009 Baseline Classifier: XGBoost and MLP for Vulnerability Classification, with the XpertSystems Catalog's Most Comprehensive Structural-Leakage Audit},
  author = {XpertSystems.ai},
  year   = {2026},
  url    = {https://huggingface.co/xpertsystems/cyb009-baseline-classifier},
  note   = {Reference baseline + 8-oracle-path leakage diagnostic on xpertsystems/cyb009-sample}
}
```