Skip to content

Commit 83dd678

Browse files
authored
chore(model gallery): add whiterabbitneo_whiterabbitneo-v3-7b (#5444)
Signed-off-by: Ettore Di Giacinto <[email protected]>
1 parent 9d6c9f8 commit 83dd678

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed

gallery/index.yaml

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7499,6 +7499,39 @@
74997499
- filename: ArliAI_QwQ-32B-ArliAI-RpR-v4-Q4_K_M.gguf
75007500
sha256: fd67ca1e792efb25129cbd17b9b0f5c410dd963f17234828686928d21039b585
75017501
uri: huggingface://bartowski/ArliAI_QwQ-32B-ArliAI-RpR-v4-GGUF/ArliAI_QwQ-32B-ArliAI-RpR-v4-Q4_K_M.gguf
7502+
- !!merge <<: *qwen25
7503+
name: "whiterabbitneo_whiterabbitneo-v3-7b"
7504+
icon: https://huggingface.co/WhiteRabbitNeo/WhiteRabbitNeo-V3-7B/resolve/main/whiterabbitneo-logo-defcon.png
7505+
urls:
7506+
- https://huggingface.co/WhiteRabbitNeo/WhiteRabbitNeo-V3-7B
7507+
- https://huggingface.co/bartowski/WhiteRabbitNeo_WhiteRabbitNeo-V3-7B-GGUF
7508+
description: |
7509+
A LLM model focused on security.
7510+
Topics Covered:
7511+
7512+
- Open Ports: Identifying open ports is crucial as they can be entry points for attackers. Common ports to check include HTTP (80, 443), FTP (21), SSH (22), and SMB (445).
7513+
- Outdated Software or Services: Systems running outdated software or services are often vulnerable to exploits. This includes web servers, database servers, and any third-party software.
7514+
- Default Credentials: Many systems and services are installed with default usernames and passwords, which are well-known and can be easily exploited.
7515+
- Misconfigurations: Incorrectly configured services, permissions, and security settings can introduce vulnerabilities.
7516+
- Injection Flaws: SQL injection, command injection, and cross-site scripting (XSS) are common issues in web applications.
7517+
- Unencrypted Services: Services that do not use encryption (like HTTP instead of HTTPS) can expose sensitive data.
7518+
- Known Software Vulnerabilities: Checking for known vulnerabilities in software using databases like the National Vulnerability Database (NVD) or tools like Nessus or OpenVAS.
7519+
- Cross-Site Request Forgery (CSRF): This is where unauthorized commands are transmitted from a user that the web application trusts.
7520+
- Insecure Direct Object References: This occurs when an application provides direct access to objects based on user-supplied input.
7521+
- Security Misconfigurations in Web Servers/Applications: This includes issues like insecure HTTP headers or verbose error messages that reveal too much information.
7522+
- Broken Authentication and Session Management: This can allow attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities.
7523+
- Sensitive Data Exposure: Includes vulnerabilities that expose sensitive data, such as credit card numbers, health records, or personal information.
7524+
- API Vulnerabilities: In modern web applications, APIs are often used and can have vulnerabilities like insecure endpoints or data leakage.
7525+
- Denial of Service (DoS) Vulnerabilities: Identifying services that are vulnerable to DoS attacks, which can make the resource unavailable to legitimate users.
7526+
- Buffer Overflows: Common in older software, these vulnerabilities can allow an attacker to crash the system or execute arbitrary code.
7527+
- More ..
7528+
overrides:
7529+
parameters:
7530+
model: WhiteRabbitNeo_WhiteRabbitNeo-V3-7B-Q4_K_M.gguf
7531+
files:
7532+
- filename: WhiteRabbitNeo_WhiteRabbitNeo-V3-7B-Q4_K_M.gguf
7533+
sha256: 584bfc1f4c160928842866c566129f9789c4671af8e51a9e36ba0ebf10f24f41
7534+
uri: huggingface://bartowski/WhiteRabbitNeo_WhiteRabbitNeo-V3-7B-GGUF/WhiteRabbitNeo_WhiteRabbitNeo-V3-7B-Q4_K_M.gguf
75027535
- &llama31
75037536
url: "github:mudler/LocalAI/gallery/llama3.1-instruct.yaml@master" ## LLama3.1
75047537
icon: https://avatars.githubusercontent.com/u/153379578

0 commit comments

Comments
 (0)