NostromoHub commited on
Commit
7695349
·
verified ·
1 Parent(s): 8aac1ab

Upload 21 files

Browse files
.gitattributes CHANGED
@@ -57,3 +57,4 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
57
  # Video files - compressed
58
  *.mp4 filter=lfs diff=lfs merge=lfs -text
59
  *.webm filter=lfs diff=lfs merge=lfs -text
 
 
57
  # Video files - compressed
58
  *.mp4 filter=lfs diff=lfs merge=lfs -text
59
  *.webm filter=lfs diff=lfs merge=lfs -text
60
+ rag/index.faiss filter=lfs diff=lfs merge=lfs -text
90-days.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cc5f0733ff67e793c19d5e645ce4693b5b9e2c2c1dc2213607875829931b06e1
3
+ size 39290478
README.md CHANGED
@@ -1,56 +1,27 @@
1
  ---
2
  license: cc0-1.0
3
  tags:
4
- - security
5
- - cybersecurity
6
- - cve
7
- - cisa
8
- - kev
9
- - nvd
10
- - parquet
11
- - rag
12
- - public-domain
13
- pretty_name: CVE-KEV Snapshot (2025-10-29)
14
- viewer: true
15
- configs:
16
- - config_name: preview
17
- data_files:
18
- - split: train
19
- path: parquet/preview.parquet
20
- - config_name: cve
21
- data_files:
22
- - split: train
23
- path: parquet/cve.parquet
24
- - config_name: nvd_meta
25
- data_files:
26
- - split: train
27
- path: parquet/nvd_meta.parquet
28
- - config_name: kev
29
- data_files:
30
- - split: train
31
- path: parquet/kev.parquet
32
- - config_name: edges
33
- data_files:
34
- - split: train
35
- path: parquet/edges.parquet
36
- - config_name: rag_meta
37
- data_files:
38
- - split: train
39
- path: rag/meta.parquet
40
- - config_name: rag_mapping
41
- data_files:
42
- - split: train
43
- path: rag/mapping.parquet
44
  ---
45
 
46
- ## CVE-KEV Snapshot (one-time, offline bundle)
47
 
48
  This bundle lets you rank likely exploited CVEs and cite official sources without any APIs or accounts, fully offline. It’s a one-time snapshot of the last 90 days of NVD, aligned with CISA KEV for immediate focus on likely exploited CVEs. Query-ready Parquet tables and an optional small RAG pack let you rank by severity, pivot by CWE, and fetch references for briefings. Every row includes provenance; validation metrics and an integrity manifest are included. The compiled dataset is dedicated to the public domain (CC0).
49
 
50
  ## Quick start (60 seconds)
51
 
52
- - Open `demo/OVX_quickstart.html` (no network) or [demo/OVX_quickstart.ipynb](demo/OVX_quickstart.ipynb).
53
  - Or run this DuckDB query for top KEV CVEs by severity:
 
54
  ```sql
55
  SELECT c.cve_id, m.cvss_v3_score, k.date_added
56
  FROM read_parquet('parquet/kev.parquet') k
@@ -60,54 +31,219 @@ ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
60
  LIMIT 20;
61
  ```
62
 
63
- ## Snapshot
64
-
65
- - Snapshot as of (UTC): 2025-09-05T02:12:27Z
66
- - NVD window (days): 90
67
 
68
  ## Accuracy at a glance
69
 
70
- - Total CVE rows: 11,344
71
- - Total KEV rows: 27
72
- - Artifacts: [Validation Report](docs/VALIDATION.json) · [Integrity Check](docs/INTEGRITY.txt) · [Build Manifest](docs/BUILD_MANIFEST.json)
73
  - KEV is window‑aligned; within‑window coverage = 1.0 by design. See `docs/VALIDATION.json` for `kev_rows_total_fetched`, `kev_rows_within_window`, `kev_rows_filtered_out`, and `kev_within_window_over_global_ratio`.
74
 
75
- ## Contents
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
76
 
77
- - `parquet/`: `cve.parquet`, `nvd_meta.parquet`, `kev.parquet`, `edges.parquet`, `preview.parquet` (~1000 CVEs; see preview criteria)
78
- - `rag/` (optional): `index.faiss`, `meta.parquet`, `mapping.parquet`, `vectors.npy`
79
- - `docs/`: `LICENSES.md`, `LICENCE.md` (CC0 legal code), `NOTICE.md`, `INTEGRITY.txt`, `VALIDATION.json`, `BUILD_MANIFEST.json`
80
- - `demo/`: `OVX_quickstart.ipynb`, `OVX_quickstart.html`
81
 
82
- ## RAG note
83
 
84
- Optional RAG pack built from PD/CC0 text using `BAAI/bge-small-en-v1.5` (384‑dim), normalized vectors with inner product (cosine) similarity. Retrieval is offline-only; query embedding requires the model to be already cached locally.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
85
 
86
  ## Preview parquet
87
 
88
- - [parquet/preview.parquet](parquet/preview.parquet) is a convenience subset for quick inspection.
89
  - Selection: first 1000 rows by `cve_id` ordering from `parquet/cve.parquet`.
90
- - Columns: `cve_id`, `summary`, `published_date`, `modified_date` (when available); falls back to a besteffort subset if needed.
 
 
 
 
 
 
 
 
 
 
 
 
 
91
 
92
- ## Validation, integrity, build metadata
 
 
 
 
 
 
 
93
 
94
- - `docs/VALIDATION.json` includes: counts, `cvss_v3_presence_ratio`, `cwe_presence_ratio`, `kev_cve_coverage_ratio`, `kev_cve_coverage_ratio_within_window`, `kev_rows_total_fetched`, `kev_rows_within_window`, `kev_within_window_over_global_ratio`, `rejected_cve_count`, `url_shape_failures`, `http_head_failures_hard`, `http_head_failures_flaky`, `dead_reference_links`, `duplicate_edges_dropped`, `snapshot_as_of`.
95
- - URL checks (if present) were executed conservatively with a single worker.
96
- - Verify integrity locally:
97
- - macOS: `shasum -a 256 -c docs/INTEGRITY.txt`
98
- - Linux: `sha256sum -c docs/INTEGRITY.txt`
99
- - Build metadata (transparency): see `docs/BUILD_MANIFEST.json` for snapshot parameters (timestamp, NVD window, tool/version info, internal commit/config). Provided for transparency; the build system is not included.
100
 
101
- ## Storage and performance
 
 
 
 
 
 
 
102
 
103
- - Parquet compression: `snappy`.
104
- - Disk footprint varies by window size; see file sizes before downloading.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
105
 
106
  ## Limitations
107
 
108
- - Some CVEs may lack CVSS vectors/scores within the window (nulls are expected).
109
- - URL checks are conservative and may still include dead/redirected links; verify with official sources.
110
- - KEV rows are filtered to the NVD window; counts reflect inwindow coverage, not global totals.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
111
 
112
  ## Usage
113
 
@@ -141,16 +277,4 @@ df = k.join(c, on='cve_id').join(m, on='cve_id', how='left')
141
  print(df.head())
142
  ```
143
 
144
- ## Non-affiliation and licensing
145
-
146
- - Not affiliated with NIST/NVD, CISA/KEV, or FIRST/EPSS.
147
- - NVD non-endorsement: "This product uses data from the NVD API but is not endorsed or certified by the NVD."
148
- - Compiled artifact dedicated to the public domain under CC0 1.0 (see `docs/LICENCE.md`).
149
- - Upstream sources: NVD (public domain), CISA KEV (CC0). Linked third‑party pages (vendor advisories, blogs, etc.) are governed by their own terms.
150
 
151
- ## Citation
152
-
153
- If you use this snapshot, please cite:
154
- ```
155
- "CVE-KEV Snapshot (${snapshot_as_of})", CC0-1.0, https://huggingface.co/datasets/NostromoHub/cve-kev-snapshot-90d-2025-10-29
156
- ```
 
1
  ---
2
  license: cc0-1.0
3
  tags:
4
+ - security
5
+ - cybersecurity
6
+ - cve
7
+ - cisa
8
+ - kev
9
+ - nvd
10
+ - parquet
11
+ - rag
12
+ - public-domain
13
+ pretty_name: CVE-KEV Snapshot (2025-10-29T13:51:37Z)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
14
  ---
15
 
16
+ # CVE-KEV Snapshot (one-time, offline bundle)
17
 
18
  This bundle lets you rank likely exploited CVEs and cite official sources without any APIs or accounts, fully offline. It’s a one-time snapshot of the last 90 days of NVD, aligned with CISA KEV for immediate focus on likely exploited CVEs. Query-ready Parquet tables and an optional small RAG pack let you rank by severity, pivot by CWE, and fetch references for briefings. Every row includes provenance; validation metrics and an integrity manifest are included. The compiled dataset is dedicated to the public domain (CC0).
19
 
20
  ## Quick start (60 seconds)
21
 
22
+ - Open `demo/OVX_quickstart.html` (no network) or `demo/OVX_quickstart.ipynb`.
23
  - Or run this DuckDB query for top KEV CVEs by severity:
24
+
25
  ```sql
26
  SELECT c.cve_id, m.cvss_v3_score, k.date_added
27
  FROM read_parquet('parquet/kev.parquet') k
 
31
  LIMIT 20;
32
  ```
33
 
34
+ Snapshot as of (UTC): 2025-10-29T13:51:37Z
35
+ NVD window (days): 90
 
 
36
 
37
  ## Accuracy at a glance
38
 
39
+ - Total CVE rows: 12307
40
+ - Total KEV rows: 28
41
+ - Artifacts: [Validation Report](docs/VALIDATION.json) · [Integrity Check](docs/INTEGRITY.txt) · [Build Manifest](docs/BUILD_MANIFEST.json)
42
  - KEV is window‑aligned; within‑window coverage = 1.0 by design. See `docs/VALIDATION.json` for `kev_rows_total_fetched`, `kev_rows_within_window`, `kev_rows_filtered_out`, and `kev_within_window_over_global_ratio`.
43
 
44
+ ## What this is
45
+
46
+ A single, immutable dataset combining:
47
+ - CVE records (IDs, summaries) with CVSS and CWE from NVD (public domain)
48
+ - KEV flags from CISA (CC0)
49
+ - Provenance on every row and edge (source, source_url, retrieved_at, source_record_hash)
50
+ - A tiny RAG pack (embeddings + FAISS index) built only from PD/CC0 text
51
+
52
+ ## Who this is for
53
+
54
+ - Security ML teams: feature prototyping (KEV=true, CVSS, CWE signals)
55
+ - RAG/QA prototypers: grounded retrieval with official citations
56
+ - Analysts: local, verifiable artifact (no APIs/accounts)
57
+
58
+ ## What you can do quickly (offline)
59
+
60
+ - Rank KEV CVEs by severity; pivot by CWE categories
61
+ - Retrieve references for a CVE (official NVD/KEV links)
62
+ - Trial RAG with a tiny index (if the embedding model is cached locally)
63
+ - Inspect validation metrics and per-row provenance
64
+
65
+ ## Files
66
 
67
+ - parquet/: cve.parquet, nvd_meta.parquet, kev.parquet, edges.parquet, preview.parquet (~1000 CVEs; see preview criteria)
68
+ - rag/: index.faiss, meta.parquet, mapping.parquet, vectors.npy (optional)
69
+ - docs/: LICENSES.md, LICENCE.md (CC0 legal code), NOTICE.md, INTEGRITY.txt, VALIDATION.json (if enabled), BUILD_MANIFEST.json
70
+ - demo/: OVX_quickstart.ipynb (offline quickstart)
71
 
72
+ ## Validation and integrity
73
 
74
+ - VALIDATION.json includes: counts, cvss_v3_presence_ratio, cwe_presence_ratio, kev_cve_coverage_ratio, kev_cve_coverage_ratio_within_window, kev_rows_total_fetched, kev_rows_within_window, kev_within_window_over_global_ratio, rejected_cve_count, url_shape_failures, http_head_failures_hard, http_head_failures_flaky, dead_reference_links, duplicate_edges_dropped, snapshot_as_of
75
+ - URL checks (if present in this snapshot’s validation step) were executed conservatively with a single worker to reduce flakiness and rate limiting.
76
+ - INTEGRITY.txt: SHA-256 list of all files in this bundle. Verify locally:
77
+ - macOS:
78
+ ```bash
79
+ shasum -a 256 -c docs/INTEGRITY.txt
80
+ ```
81
+ - Linux:
82
+ ```bash
83
+ sha256sum -c docs/INTEGRITY.txt
84
+ ```
85
+
86
+ - Build metadata: see `docs/BUILD_MANIFEST.json` for snapshot parameters (timestamp, NVD window, tool/version info, internal commit/config). Provided for transparency; the build system is not included.
87
+
88
+ ## RAG constraints
89
+
90
+ - Texts are PD/CC0-only (NVD short descriptions, KEV notes)
91
+ - meta.parquet: normalize=true, metric="IP", pinned model_name="BAAI/bge-small-en-v1.5" and dimension=384
92
+ - Retrieval requires the model to be present in local cache; no downloads
93
+ - If `rag/mapping.parquet` is present, it maps FAISS `row_index` → `cve_id` with columns: `row_index` (int32), `cve_id` (string)
94
 
95
  ## Preview parquet
96
 
97
+ - `parquet/preview.parquet` is a convenience subset for quick inspection.
98
  - Selection: first 1000 rows by `cve_id` ordering from `parquet/cve.parquet`.
99
+ - Columns: `cve_id`, `summary`, `published_date`, `modified_date` (when available); otherwise falls back to a best-effort subset.
100
+
101
+ ## Non-affiliation and license
102
+
103
+ - Not affiliated with NIST/NVD, CISA/KEV, or FIRST/EPSS
104
+ - NVD non-endorsement: "This product uses data from the NVD API but is not endorsed or certified by the NVD."
105
+ - Compiled artifact dedicated to the public domain under CC0 1.0 (see docs/LICENCE.md)
106
+ - Upstream sources: NVD (public domain), CISA KEV (CC0). Third‑party pages reached via reference URLs are governed by their own terms
107
+
108
+ ## Start here
109
+
110
+ - Open [demo/OVX_quickstart.ipynb](demo/OVX_quickstart.ipynb) (no network calls)
111
+ - Or open [demo/OVX_quickstart.html](demo/OVX_quickstart.html) for a view-only quickstart
112
+ - Or query with DuckDB directly:
113
 
114
+ ```
115
+ SELECT c.cve_id, m.cvss_v3_score, k.date_added
116
+ FROM read_parquet('parquet/kev.parquet') k
117
+ JOIN read_parquet('parquet/cve.parquet') c USING (cve_id)
118
+ LEFT JOIN read_parquet('parquet/nvd_meta.parquet') m USING (cve_id)
119
+ ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
120
+ LIMIT 20;
121
+ ```
122
 
123
+ ### Top queries to try (DuckDB)
 
 
 
 
 
124
 
125
+ ```sql
126
+ -- Top KEV CVEs by CVSS
127
+ SELECT c.cve_id, m.cvss_v3_score, k.date_added
128
+ FROM read_parquet('parquet/kev.parquet') k
129
+ JOIN read_parquet('parquet/cve.parquet') c USING (cve_id)
130
+ LEFT JOIN read_parquet('parquet/nvd_meta.parquet') m USING (cve_id)
131
+ ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
132
+ LIMIT 20;
133
 
134
+ -- Count malformed or missing CVSS
135
+ SELECT SUM(cvss_v3_score IS NULL) AS missing_cvss_v3, COUNT(*) AS total
136
+ FROM read_parquet('parquet/nvd_meta.parquet');
137
+
138
+ -- Top CWE categories by count
139
+ WITH u AS (
140
+ SELECT UNNEST(cwe_ids) AS cwe FROM read_parquet('parquet/nvd_meta.parquet')
141
+ )
142
+ SELECT cwe, COUNT(*) AS cnt
143
+ FROM u
144
+ GROUP BY cwe
145
+ ORDER BY cnt DESC
146
+ LIMIT 20;
147
+
148
+ -- References for a specific CVE
149
+ SELECT dst_id AS reference_url
150
+ FROM read_parquet('parquet/edges.parquet')
151
+ WHERE src_type='cve' AND src_id='CVE-2021-44228' AND edge_type='cve_ref_url'
152
+ ORDER BY reference_url;
153
+ ```
154
+
155
+ ## Validation notes
156
+
157
+ - Where URL reachability checks were included, they used a single worker by default and domain-specific pacing (e.g., stricter for `vuldb.com`). Counts of malformed URLs and network failures are summarized in `docs/VALIDATION.json`.
158
 
159
  ## Limitations
160
 
161
+ - Some CVEs may lack CVSS vectors/scores in the NVD window (nulls are expected).
162
+ - URL checks are conservative and may still include dead or redirected links; always verify with official sources.
163
+ - KEV rows are filtered to the NVD window by design; KEV counts reflect in-window coverage, not global totals.
164
+
165
+ ## Scope and KEV alignment
166
+
167
+ - KEV is filtered to the same NVD window; only KEV CVEs that are also in the NVD window are included. Edges never reference out‑of‑window CVEs.
168
+ - Coverage metric naming: `kev_cve_coverage_ratio_within_window` reflects this alignment and is expected to be 1.0 by design. The legacy key `kev_cve_coverage_ratio` is retained and equals the within-window value.
169
+ - Global context ratio: `kev_within_window_over_global_ratio = kev_rows_within_window / kev_rows_total_fetched` (share of KEV entries that fall into this snapshot’s NVD window).
170
+
171
+
172
+ ## Schemas (columns and types)
173
+
174
+ - parquet/cve.parquet
175
+ - cve_id: string
176
+ - summary: string
177
+ - description_hash: string
178
+ - published_date: timestamp[us, UTC]
179
+ - modified_date: timestamp[us, UTC]
180
+ - is_rejected: boolean
181
+ - source: string
182
+ - source_url: string
183
+ - retrieved_at: timestamp[us, UTC]
184
+ - source_record_hash: string
185
+
186
+ - parquet/nvd_meta.parquet
187
+ - cve_id: string
188
+ - cvss_v3_score: float64 (nullable)
189
+ - cvss_v3_vector: string (nullable)
190
+ - cvss_v2_score: float64 (nullable)
191
+ - cwe_ids: list<string>
192
+ - reference_urls: list<string>
193
+ - ref_tags: list<string>
194
+ - source: string
195
+ - source_url: string
196
+ - retrieved_at: timestamp[us, UTC]
197
+ - source_record_hash: string
198
+
199
+ - parquet/kev.parquet
200
+ - cve_id: string
201
+ - date_added: date32[day]
202
+ - notes: string (nullable)
203
+ - source: string
204
+ - source_url: string
205
+ - retrieved_at: timestamp[us, UTC]
206
+ - source_record_hash: string
207
+
208
+ - parquet/edges.parquet
209
+ - src_type: string
210
+ - src_id: string
211
+ - edge_type: string
212
+ - dst_type: string
213
+ - dst_id: string
214
+ - source: string
215
+ - source_url: string
216
+ - retrieved_at: timestamp[us, UTC]
217
+
218
+ - rag/meta.parquet
219
+ - model_name: string
220
+ - dim: int32
221
+ - normalize: boolean
222
+ - metric: string
223
+ - texts_count: int64
224
+
225
+ ## Storage and performance notes
226
+
227
+ - Parquet compression: `snappy` (writer default).
228
+ - Disk footprint: varies by window; see your build output directory sizes to estimate download needs.
229
+
230
+ ### Uniqueness rules
231
+
232
+ - Primary keys:
233
+ - `cve.parquet`: `cve_id`
234
+ - `nvd_meta.parquet`: `cve_id`
235
+ - `kev.parquet`: `cve_id`
236
+ - Edges composite uniqueness:
237
+ - Unique on (`src_type`, `src_id`, `edge_type`, `dst_type`, `dst_id`, `source`)
238
+ - Duplicates are dropped; see `duplicate_edges_dropped` in `docs/VALIDATION.json`.
239
+
240
+ ## Citation
241
+
242
+ If you use this snapshot, please cite:
243
+
244
+ ```
245
+ "CVE-KEV Snapshot (2025-10-29T13:51:37Z)", CC0-1.0, https://huggingface.co/datasets/NostromoHub/cve-kev-snapshot-90d-2025-10-29
246
+ ```
247
 
248
  ## Usage
249
 
 
277
  print(df.head())
278
  ```
279
 
 
 
 
 
 
 
280
 
 
 
 
 
 
 
demo/OVX_quickstart.html ADDED
@@ -0,0 +1,425 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <!DOCTYPE html>
2
+ <html lang="en">
3
+ <head>
4
+ <meta charset="UTF-8" />
5
+ <meta name="viewport" content="width=device-width, initial-scale=1.0" />
6
+ <title>CVE-KEV Snapshot — Offline Quickstart (HTML)</title>
7
+ <style>
8
+ body { font-family: -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica, Arial, sans-serif; margin: 24px; line-height: 1.45; }
9
+ h1, h2, h3 { margin-top: 1.2em; }
10
+ code, pre { background: #f6f8fa; padding: 2px 4px; border-radius: 4px; }
11
+ table { border-collapse: collapse; width: 100%; margin: 12px 0; }
12
+ th, td { text-align: left; border: 1px solid #e1e4e8; padding: 6px 8px; }
13
+ th { background: #fafbfc; }
14
+ .meta { color: #555; }
15
+ .links a { margin-right: 12px; }
16
+ .empty { color: #777; font-style: italic; }
17
+ </style>
18
+ <!-- This file is static. Values are substituted at build time. -->
19
+ </head>
20
+ <body>
21
+ <h1>CVE-KEV Snapshot — Offline Quickstart</h1>
22
+ <p class="meta">Snapshot as of (UTC): <strong>2025-10-29T13:51:37Z</strong></p>
23
+ <p class="meta">Total CVE rows: <strong>12307</strong> · Total KEV rows: <strong>28</strong></p>
24
+ <p class="links">
25
+ <a href="../docs/VALIDATION.json">Validation Report</a>
26
+ <a href="../docs/INTEGRITY.txt">Integrity Check</a>
27
+ <a href="../docs/BUILD_MANIFEST.json">Build Manifest</a>
28
+ </p>
29
+
30
+ <h2>Accuracy at a glance</h2>
31
+ <div><table><tbody><tr><th>cvss_v3_presence_ratio</th><td>0.760137</td></tr><tr><th>cwe_presence_ratio</th><td>0.827659</td></tr><tr><th>kev_cve_coverage_ratio_within_window</th><td>1.0</td></tr><tr><th>kev_rows_total_fetched</th><td>1451</td></tr><tr><th>kev_rows_within_window</th><td>28</td></tr><tr><th>kev_rows_filtered_out</th><td>1423</td></tr><tr><th>kev_within_window_over_global_ratio</th><td>0.019297</td></tr><tr><th>rejected_cve_count</th><td>103</td></tr><tr><th>url_shape_failures</th><td>0</td></tr><tr><th>http_head_failures_hard</th><td>744</td></tr><tr><th>http_head_failures_flaky</th><td>5487</td></tr><tr><th>dead_reference_links</th><td>6231</td></tr><tr><th>duplicate_edges_dropped</th><td>2027</td></tr></tbody></table></div>
32
+ <p class="meta">Notes: <code>http_head_failures_hard</code> are definitive HTTP errors (4xx/5xx); <code>http_head_failures_flaky</code> are timeouts or rate limiting. <code>dead_reference_links</code> equals the sum of these categories in this snapshot.</p>
33
+
34
+ <h2>Data previews</h2>
35
+ <h3>Top KEV CVEs by CVSS (max 20)</h3>
36
+ <div><table border="1" class="dataframe">
37
+ <thead>
38
+ <tr style="text-align: right;">
39
+ <th>cve_id</th>
40
+ <th>cvss_v3_score</th>
41
+ <th>date_added</th>
42
+ <th>notes</th>
43
+ </tr>
44
+ </thead>
45
+ <tbody>
46
+ <tr>
47
+ <td>CVE-2025-54253</td>
48
+ <td>10.0</td>
49
+ <td>2025-10-15</td>
50
+ <td>https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-54253</td>
51
+ </tr>
52
+ <tr>
53
+ <td>CVE-2025-10035</td>
54
+ <td>10.0</td>
55
+ <td>2025-09-29</td>
56
+ <td>https://www.fortra.com/security/advisories/product-security/fi-2025-012 ; https://nvd.nist.gov/vuln/detail/CVE-2025-10035</td>
57
+ </tr>
58
+ <tr>
59
+ <td>CVE-2025-20333</td>
60
+ <td>9.9</td>
61
+ <td>2025-09-25</td>
62
+ <td>CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions ; https://www.cisa.gov/eviction-strategies-tool/create-from-template ; https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks ; https://sec.cloudapps.cisco.com/security/center/private/resources/asa_ftd_continued_attacks#Details ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB ; https://nvd.nist.gov/vuln/detail/CVE-2025-20333</td>
63
+ </tr>
64
+ <tr>
65
+ <td>CVE-2025-59287</td>
66
+ <td>9.8</td>
67
+ <td>2025-10-24</td>
68
+ <td>https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 ; https://nvd.nist.gov/vuln/detail/CVE-2025-59287</td>
69
+ </tr>
70
+ <tr>
71
+ <td>CVE-2025-61932</td>
72
+ <td>9.8</td>
73
+ <td>2025-10-22</td>
74
+ <td>https://www.motex.co.jp/news/notice/2025/release251020/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-61932</td>
75
+ </tr>
76
+ <tr>
77
+ <td>CVE-2025-61882</td>
78
+ <td>9.8</td>
79
+ <td>2025-10-06</td>
80
+ <td>https://www.oracle.com/security-alerts/alert-cve-2025-61882.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-61882</td>
81
+ </tr>
82
+ <tr>
83
+ <td>CVE-2025-10585</td>
84
+ <td>9.8</td>
85
+ <td>2025-09-23</td>
86
+ <td>https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-10585</td>
87
+ </tr>
88
+ <tr>
89
+ <td>CVE-2025-57819</td>
90
+ <td>9.8</td>
91
+ <td>2025-08-29</td>
92
+ <td>https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h ; https://nvd.nist.gov/vuln/detail/CVE-2025-57819</td>
93
+ </tr>
94
+ <tr>
95
+ <td>CVE-2025-7775</td>
96
+ <td>9.8</td>
97
+ <td>2025-08-26</td>
98
+ <td>https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938 ; https://nvd.nist.gov/vuln/detail/CVE-2025-7775</td>
99
+ </tr>
100
+ <tr>
101
+ <td>CVE-2025-54948</td>
102
+ <td>9.4</td>
103
+ <td>2025-08-18</td>
104
+ <td>https://success.trendmicro.com/en-US/solution/KA-0020652 ; N/A ; https://nvd.nist.gov/vuln/detail/CVE-2025-54948</td>
105
+ </tr>
106
+ <tr>
107
+ <td>CVE-2025-6205</td>
108
+ <td>9.1</td>
109
+ <td>2025-10-28</td>
110
+ <td>https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6205 ; https://nvd.nist.gov/vuln/detail/CVE-2025-6205</td>
111
+ </tr>
112
+ <tr>
113
+ <td>CVE-2025-54236</td>
114
+ <td>9.1</td>
115
+ <td>2025-10-24</td>
116
+ <td>https://experienceleague.adobe.com/en/docs/experience-cloud-kcs/kbarticles/ka-27397 ; https://nvd.nist.gov/vuln/detail/CVE-2025-54236</td>
117
+ </tr>
118
+ <tr>
119
+ <td>CVE-2025-53690</td>
120
+ <td>9.0</td>
121
+ <td>2025-09-04</td>
122
+ <td>https://support.sitecore.com/kb?id=kb_article_view&amp;sysparm_article=KB1003865 ; https://nvd.nist.gov/vuln/detail/CVE-2025-53690</td>
123
+ </tr>
124
+ <tr>
125
+ <td>CVE-2025-21043</td>
126
+ <td>8.8</td>
127
+ <td>2025-10-02</td>
128
+ <td>https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=09 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21043</td>
129
+ </tr>
130
+ <tr>
131
+ <td>CVE-2025-48543</td>
132
+ <td>8.8</td>
133
+ <td>2025-09-04</td>
134
+ <td>https://source.android.com/docs/security/bulletin/2025-09-01 ; https://nvd.nist.gov/vuln/detail/CVE-2025-48543</td>
135
+ </tr>
136
+ <tr>
137
+ <td>CVE-2025-43300</td>
138
+ <td>8.8</td>
139
+ <td>2025-08-21</td>
140
+ <td>https://support.apple.com/en-us/124925 ; https://support.apple.com/en-us/124926 ; https://support.apple.com/en-us/124927 ; https://support.apple.com/en-us/124928 ; https://support.apple.com/en-us/124929 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43300</td>
141
+ </tr>
142
+ <tr>
143
+ <td>CVE-2025-8876</td>
144
+ <td>8.8</td>
145
+ <td>2025-08-13</td>
146
+ <td>https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-8876</td>
147
+ </tr>
148
+ <tr>
149
+ <td>CVE-2025-8088</td>
150
+ <td>8.8</td>
151
+ <td>2025-08-12</td>
152
+ <td>https://www.win-rar.com/singlenewsview.html?&amp;L=0&amp;tx_ttnews%5Btt_news%5D=283&amp;cHash=a64b4a8f662d3639dec8d65f47bc93c5 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8088</td>
153
+ </tr>
154
+ <tr>
155
+ <td>CVE-2025-6204</td>
156
+ <td>8.0</td>
157
+ <td>2025-10-28</td>
158
+ <td>https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6204 ; https://nvd.nist.gov/vuln/detail/CVE-2025-6204</td>
159
+ </tr>
160
+ <tr>
161
+ <td>CVE-2025-59230</td>
162
+ <td>7.8</td>
163
+ <td>2025-10-14</td>
164
+ <td>https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59230 ; https://nvd.nist.gov/vuln/detail/CVE-2025-59230</td>
165
+ </tr>
166
+ </tbody>
167
+ </table></div>
168
+
169
+ <h3>CWE pivot (max 20)</h3>
170
+ <div><table border="1" class="dataframe">
171
+ <thead>
172
+ <tr style="text-align: right;">
173
+ <th>cwe</th>
174
+ <th>cnt</th>
175
+ </tr>
176
+ </thead>
177
+ <tbody>
178
+ <tr>
179
+ <td>CWE-79</td>
180
+ <td>1941</td>
181
+ </tr>
182
+ <tr>
183
+ <td>CWE-89</td>
184
+ <td>1179</td>
185
+ </tr>
186
+ <tr>
187
+ <td>CWE-74</td>
188
+ <td>686</td>
189
+ </tr>
190
+ <tr>
191
+ <td>CWE-862</td>
192
+ <td>462</td>
193
+ </tr>
194
+ <tr>
195
+ <td>CWE-94</td>
196
+ <td>411</td>
197
+ </tr>
198
+ <tr>
199
+ <td>CWE-284</td>
200
+ <td>348</td>
201
+ </tr>
202
+ <tr>
203
+ <td>CWE-352</td>
204
+ <td>332</td>
205
+ </tr>
206
+ <tr>
207
+ <td>CWE-78</td>
208
+ <td>321</td>
209
+ </tr>
210
+ <tr>
211
+ <td>CWE-121</td>
212
+ <td>296</td>
213
+ </tr>
214
+ <tr>
215
+ <td>CWE-434</td>
216
+ <td>276</td>
217
+ </tr>
218
+ <tr>
219
+ <td>CWE-22</td>
220
+ <td>264</td>
221
+ </tr>
222
+ <tr>
223
+ <td>CWE-119</td>
224
+ <td>242</td>
225
+ </tr>
226
+ <tr>
227
+ <td>CWE-77</td>
228
+ <td>239</td>
229
+ </tr>
230
+ <tr>
231
+ <td>CWE-200</td>
232
+ <td>229</td>
233
+ </tr>
234
+ <tr>
235
+ <td>CWE-416</td>
236
+ <td>218</td>
237
+ </tr>
238
+ <tr>
239
+ <td>CWE-125</td>
240
+ <td>205</td>
241
+ </tr>
242
+ <tr>
243
+ <td>CWE-787</td>
244
+ <td>192</td>
245
+ </tr>
246
+ <tr>
247
+ <td>CWE-20</td>
248
+ <td>171</td>
249
+ </tr>
250
+ <tr>
251
+ <td>CWE-502</td>
252
+ <td>169</td>
253
+ </tr>
254
+ <tr>
255
+ <td>CWE-918</td>
256
+ <td>167</td>
257
+ </tr>
258
+ </tbody>
259
+ </table></div>
260
+
261
+ <h3>Citations for a CVE (sample)</h3>
262
+ <div><table border="1" class="dataframe">
263
+ <thead>
264
+ <tr style="text-align: right;">
265
+ <th>cve_id</th>
266
+ <th>reference_url</th>
267
+ </tr>
268
+ </thead>
269
+ <tbody>
270
+ <tr>
271
+ <td>CVE-2025-54589</td>
272
+ <td>https://github.com/9001/copyparty/commit/a8705e611d05eeb22be5d3d7d9ab5c020fe54c62</td>
273
+ </tr>
274
+ <tr>
275
+ <td>CVE-2025-54589</td>
276
+ <td>https://github.com/9001/copyparty/releases/tag/v1.18.7</td>
277
+ </tr>
278
+ <tr>
279
+ <td>CVE-2025-54589</td>
280
+ <td>https://github.com/9001/copyparty/security/advisories/GHSA-8mx2-rjh8-q3jq</td>
281
+ </tr>
282
+ <tr>
283
+ <td>CVE-2025-7738</td>
284
+ <td>https://access.redhat.com/errata/RHSA-2025:12772</td>
285
+ </tr>
286
+ <tr>
287
+ <td>CVE-2025-7738</td>
288
+ <td>https://access.redhat.com/security/cve/CVE-2025-7738</td>
289
+ </tr>
290
+ <tr>
291
+ <td>CVE-2025-7738</td>
292
+ <td>https://bugzilla.redhat.com/show_bug.cgi?id=2381589</td>
293
+ </tr>
294
+ <tr>
295
+ <td>CVE-2025-8407</td>
296
+ <td>https://code-projects.org/</td>
297
+ </tr>
298
+ <tr>
299
+ <td>CVE-2025-8407</td>
300
+ <td>https://github.com/wllovemy/cve/issues/3</td>
301
+ </tr>
302
+ <tr>
303
+ <td>CVE-2025-8407</td>
304
+ <td>https://vuldb.com/?ctiid.318395</td>
305
+ </tr>
306
+ <tr>
307
+ <td>CVE-2025-8407</td>
308
+ <td>https://vuldb.com/?id.318395</td>
309
+ </tr>
310
+ <tr>
311
+ <td>CVE-2025-8407</td>
312
+ <td>https://vuldb.com/?submit.624009</td>
313
+ </tr>
314
+ <tr>
315
+ <td>CVE-2011-10008</td>
316
+ <td>https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/mplayer_m3u_bof.rb</td>
317
+ </tr>
318
+ <tr>
319
+ <td>CVE-2011-10008</td>
320
+ <td>https://www.exploit-db.com/exploits/17013</td>
321
+ </tr>
322
+ <tr>
323
+ <td>CVE-2011-10008</td>
324
+ <td>https://www.vulncheck.com/advisories/mplayer-lite-r33064-m3u-stack-based-buffer-overflow</td>
325
+ </tr>
326
+ <tr>
327
+ <td>CVE-2012-10021</td>
328
+ <td>https://forums.dlink.com/index.php?topic=51923.0</td>
329
+ </tr>
330
+ <tr>
331
+ <td>CVE-2012-10021</td>
332
+ <td>https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb</td>
333
+ </tr>
334
+ <tr>
335
+ <td>CVE-2012-10021</td>
336
+ <td>https://web.archive.org/web/20121012062554/http://www.devttys0.com/2012/10/exploiting-a-mips-stack-overflow/</td>
337
+ </tr>
338
+ <tr>
339
+ <td>CVE-2012-10021</td>
340
+ <td>https://www.exploit-db.com/exploits/29127</td>
341
+ </tr>
342
+ <tr>
343
+ <td>CVE-2012-10021</td>
344
+ <td>https://www.vulncheck.com/advisories/dlink-dir605l-captcha-handling-stack-based-buffer-overflow</td>
345
+ </tr>
346
+ <tr>
347
+ <td>CVE-2013-10033</td>
348
+ <td>https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/kimai_sqli.rb</td>
349
+ </tr>
350
+ </tbody>
351
+ </table></div>
352
+
353
+ <h3>Provenance sample</h3>
354
+ <div><table border="1" class="dataframe">
355
+ <thead>
356
+ <tr style="text-align: right;">
357
+ <th>cve_id</th>
358
+ <th>source</th>
359
+ <th>source_url</th>
360
+ <th>retrieved_at</th>
361
+ <th>source_record_hash</th>
362
+ </tr>
363
+ </thead>
364
+ <tbody>
365
+ <tr>
366
+ <td>CVE-2005-10004</td>
367
+ <td>nvd</td>
368
+ <td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&amp;pubEndDate=2025-10-29T13:51:37.000Z&amp;resultsPerPage=2000&amp;startIndex=2000</td>
369
+ <td>2025-10-29 06:52:01.759408-07:00</td>
370
+ <td>2a55c362bb75b1cf2ccee02b7ac3b31a11e1e546ad68e5fc28f0cd656375de41</td>
371
+ </tr>
372
+ <tr>
373
+ <td>CVE-2008-20001</td>
374
+ <td>nvd</td>
375
+ <td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&amp;pubEndDate=2025-10-29T13:51:37.000Z&amp;resultsPerPage=2000&amp;startIndex=2000</td>
376
+ <td>2025-10-29 06:52:01.759408-07:00</td>
377
+ <td>d95f6a12b98c9caebea1c431ba26e4a8b8b77711cd94eccd7abc43a9ec39aa94</td>
378
+ </tr>
379
+ <tr>
380
+ <td>CVE-2009-10005</td>
381
+ <td>nvd</td>
382
+ <td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&amp;pubEndDate=2025-10-29T13:51:37.000Z&amp;resultsPerPage=2000&amp;startIndex=2000</td>
383
+ <td>2025-10-29 06:52:01.759408-07:00</td>
384
+ <td>a40b9fda78392a9207ebb108cfcc38f34ecca7f4028b4d98f96abbba244b48f4</td>
385
+ </tr>
386
+ <tr>
387
+ <td>CVE-2009-10006</td>
388
+ <td>nvd</td>
389
+ <td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&amp;pubEndDate=2025-10-29T13:51:37.000Z&amp;resultsPerPage=2000&amp;startIndex=2000</td>
390
+ <td>2025-10-29 06:52:01.759408-07:00</td>
391
+ <td>a06f93253a5961c5dcdfafc518d6f70b1b57faef5f20cdd9e0368f927f6e5c23</td>
392
+ </tr>
393
+ <tr>
394
+ <td>CVE-2009-20002</td>
395
+ <td>nvd</td>
396
+ <td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&amp;pubEndDate=2025-10-29T13:51:37.000Z&amp;resultsPerPage=2000&amp;startIndex=2000</td>
397
+ <td>2025-10-29 06:52:01.759408-07:00</td>
398
+ <td>a0293a64b504ab0094417c0feeb192786b5d5c857b944f287f28fa6ab8e28453</td>
399
+ </tr>
400
+ </tbody>
401
+ </table></div>
402
+
403
+ <h2>RAG configuration</h2>
404
+ <p>model_name=BAAI/bge-small-en-v1.5, dim=384, normalize=True, metric=IP, texts_count=12335</p>
405
+ <p class="meta">Retrieval requires the model to be present in the local cache; no downloads are attempted.</p>
406
+
407
+ <h2>Limits & assumptions</h2>
408
+ <ul>
409
+ <li>Point-in-time snapshot; no update cadence.</li>
410
+ <li>Upstream truth: reflects NVD (PD) and CISA KEV (CC0).</li>
411
+ <li>KEV is filtered to the same NVD window; only KEV CVEs that are also in the NVD window are included. Edges never reference out‑of‑window CVEs.</li>
412
+ <li>URL checks are bounded; timeouts possible.</li>
413
+ <li>Texts for RAG are PD/CC0-only.</li>
414
+ </ul>
415
+
416
+ <h2>Links</h2>
417
+ <ul>
418
+ <li><a href="OVX_quickstart.ipynb">OVX_quickstart.ipynb</a></li>
419
+ <li><a href="../parquet/">parquet/</a></li>
420
+ <li><a href="../docs/">docs/</a></li>
421
+ </ul>
422
+ </body>
423
+ </html>
424
+
425
+
demo/OVX_quickstart.ipynb ADDED
@@ -0,0 +1,485 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "cells": [
3
+ {
4
+ "cell_type": "markdown",
5
+ "metadata": {},
6
+ "source": [
7
+ "# CVE-KEV Snapshot — Offline Quickstart\n",
8
+ "\n",
9
+ "Audience: security ML/RAG practitioners and analysts. Runs fully offline; no network calls.\n",
10
+ "\n",
11
+ "- What this does:\n",
12
+ " - Loads Parquet tables and shows quick triage and retrieval examples\n",
13
+ " - Surfaces integrity and validation signals (accuracy)\n",
14
+ " - Skips RAG if the embedding model isn't cached locally\n"
15
+ ]
16
+ },
17
+ {
18
+ "cell_type": "code",
19
+ "execution_count": null,
20
+ "metadata": {},
21
+ "outputs": [],
22
+ "source": [
23
+ "HF_DATASET_URL = 'https://huggingface.co/datasets/NostromoHub/cve-kev-snapshot-90d-2025-09-04/resolve/main' # used only in hosted runtimes for optional installs\n"
24
+ ]
25
+ },
26
+ {
27
+ "cell_type": "markdown",
28
+ "metadata": {},
29
+ "source": [
30
+ "Running in Colab or Kaggle?\n",
31
+ "\n",
32
+ "- This offline notebook does not install dependencies by default.\n",
33
+ "- If you're in an online runtime (Colab/Kaggle), you can opt-in to install deps below.\n",
34
+ "- Local/offline users should pre-install packages (see demo/requirements-colab.txt).\n"
35
+ ]
36
+ },
37
+ {
38
+ "cell_type": "code",
39
+ "execution_count": null,
40
+ "metadata": {},
41
+ "outputs": [],
42
+ "source": [
43
+ "# Optional: install dependencies when running in Colab/Kaggle (online only)\n",
44
+ "# By default, offline users should pre-install packages and skip this cell.\n",
45
+ "try:\n",
46
+ " import os\n",
47
+ " IN_COLAB = 'COLAB_GPU' in os.environ or 'COLAB_RELEASE_TAG' in os.environ\n",
48
+ " IN_KAGGLE = 'KAGGLE_URL_BASE' in os.environ\n",
49
+ " if IN_COLAB or IN_KAGGLE:\n",
50
+ " if not HF_DATASET_URL:\n",
51
+ " raise RuntimeError('HF_DATASET_URL is empty; set it at the top of the notebook to enable online install.')\n",
52
+ " url = HF_DATASET_URL.rstrip('/') + '/demo/requirements-colab.txt'\n",
53
+ " print('Detected hosted runtime. Installing from:', url)\n",
54
+ " import subprocess, sys\n",
55
+ " subprocess.check_call([sys.executable, '-m', 'pip', 'install', '-r', url])\n",
56
+ " else:\n",
57
+ " print('Hosted runtime not detected; skipping online install.')\n",
58
+ "except Exception as e:\n",
59
+ " print('Dependency install skipped or failed:', e)\n"
60
+ ]
61
+ },
62
+ {
63
+ "cell_type": "code",
64
+ "execution_count": null,
65
+ "metadata": {},
66
+ "outputs": [],
67
+ "source": [
68
+ "# Optional: dependency check (offline-safe). Set ENABLE_AUTO_INSTALL=True to pip install.\n",
69
+ "import importlib, sys, subprocess\n",
70
+ "\n",
71
+ "ENABLE_AUTO_INSTALL = False # change to True to auto-install missing deps\n",
72
+ "REQUIRED_PACKAGES = [\"duckdb\", \"pandas\", \"pyarrow\"]\n",
73
+ "missing = []\n",
74
+ "for pkg in REQUIRED_PACKAGES:\n",
75
+ " try:\n",
76
+ " importlib.import_module(pkg)\n",
77
+ " except Exception:\n",
78
+ " missing.append(pkg)\n",
79
+ "\n",
80
+ "if missing:\n",
81
+ " print(\"Missing packages:\", missing)\n",
82
+ " if ENABLE_AUTO_INSTALL:\n",
83
+ " try:\n",
84
+ " subprocess.check_call([sys.executable, \"-m\", \"pip\", \"install\", *missing])\n",
85
+ " # Re-validate imports\n",
86
+ " for pkg in list(missing):\n",
87
+ " importlib.import_module(pkg)\n",
88
+ " print(\"Installed successfully.\")\n",
89
+ " except Exception as install_err:\n",
90
+ " print(\"Auto-install failed:\", install_err)\n",
91
+ " print(\"Run manually:\", \"pip install \" + \" \".join(missing))\n",
92
+ " else:\n",
93
+ " print(\"Set ENABLE_AUTO_INSTALL=True above or run:\")\n",
94
+ " print(\"pip install \" + \" \".join(missing))\n",
95
+ "else:\n",
96
+ " print(\"All required packages are present.\")\n"
97
+ ]
98
+ },
99
+ {
100
+ "cell_type": "markdown",
101
+ "metadata": {},
102
+ "source": [
103
+ "Artifacts (click to view): [Validation Report](../docs/VALIDATION.json) · [Integrity Check](../docs/INTEGRITY.txt) · [Build Manifest](../docs/BUILD_MANIFEST.json)\n"
104
+ ]
105
+ },
106
+ {
107
+ "cell_type": "code",
108
+ "execution_count": null,
109
+ "metadata": {},
110
+ "outputs": [],
111
+ "source": [
112
+ "from pathlib import Path\n",
113
+ "import json\n",
114
+ "\n",
115
+ "BASE = Path('..').resolve()\n",
116
+ "PARQ = BASE / 'parquet'\n",
117
+ "DOCS = BASE / 'docs'\n",
118
+ "RAG = BASE / 'rag'\n",
119
+ "\n",
120
+ "assert PARQ.exists() and DOCS.exists(), 'Missing required directories. Ensure you are running the notebook from the snapshot \"demo\" directory.'\n"
121
+ ]
122
+ },
123
+ {
124
+ "cell_type": "code",
125
+ "execution_count": null,
126
+ "metadata": {},
127
+ "outputs": [],
128
+ "source": [
129
+ "# Snapshot metadata\n",
130
+ "manifest = json.loads((DOCS / 'BUILD_MANIFEST.json').read_text())\n",
131
+ "print('snapshot_as_of:', manifest.get('snapshot_as_of'))\n",
132
+ "# Prefer manifest-provided window; fallback to parsing README if absent\n",
133
+ "window_days = manifest.get('nvd_window_days')\n",
134
+ "if window_days is None:\n",
135
+ " try:\n",
136
+ " txt = (BASE / 'README.md').read_text(encoding='utf-8')\n",
137
+ " marker = 'NVD window (days): '\n",
138
+ " i = txt.find(marker)\n",
139
+ " if i != -1:\n",
140
+ " j = i + len(marker)\n",
141
+ " k = j\n",
142
+ " while k < len(txt) and txt[k].isdigit():\n",
143
+ " k += 1\n",
144
+ " window_days = int(txt[j:k]) if k > j else None\n",
145
+ " except Exception:\n",
146
+ " window_days = None\n",
147
+ "print('nvd_window_days:', window_days)\n",
148
+ "print('model:', manifest.get('model_name'), 'dim:', manifest.get('model_dim'))\n"
149
+ ]
150
+ },
151
+ {
152
+ "cell_type": "code",
153
+ "execution_count": null,
154
+ "metadata": {},
155
+ "outputs": [],
156
+ "source": [
157
+ "# Integrity spot-check (first 5 entries)\n",
158
+ "import hashlib\n",
159
+ "\n",
160
+ "def sha256(path: Path) -> str:\n",
161
+ " h = hashlib.sha256()\n",
162
+ " with path.open('rb') as f:\n",
163
+ " for chunk in iter(lambda: f.read(1024*1024), b''):\n",
164
+ " h.update(chunk)\n",
165
+ " return h.hexdigest()\n",
166
+ "\n",
167
+ "lines = (DOCS / 'INTEGRITY.txt').read_text().splitlines()\n",
168
+ "# Parse lines robustly on whitespace: '<digest> <relative_path>'\n",
169
+ "pairs = []\n",
170
+ "for ln in lines:\n",
171
+ " if not ln.strip():\n",
172
+ " continue\n",
173
+ " parts = ln.split()\n",
174
+ " digest_expected, rel = parts[0], ' '.join(parts[1:])\n",
175
+ " pairs.append((rel, digest_expected))\n",
176
+ "\n",
177
+ "subset = [rel for rel, _ in pairs[:5]]\n",
178
+ "issues = []\n",
179
+ "for rel in subset:\n",
180
+ " digest_expected = next(d for r, d in pairs if r == rel)\n",
181
+ " actual = sha256(BASE / rel)\n",
182
+ " if actual != digest_expected:\n",
183
+ " issues.append(rel)\n",
184
+ "print('integrity_spotcheck_mismatches:', issues)\n"
185
+ ]
186
+ },
187
+ {
188
+ "cell_type": "code",
189
+ "execution_count": null,
190
+ "metadata": {},
191
+ "outputs": [],
192
+ "source": [
193
+ "# Load with DuckDB; fallback to pandas if needed\n",
194
+ "try:\n",
195
+ " import duckdb as dd\n",
196
+ " con = dd.connect()\n",
197
+ " con.execute('PRAGMA threads=4')\n",
198
+ " engine = 'duckdb'\n",
199
+ "except Exception as e:\n",
200
+ " import pandas as pd\n",
201
+ " engine = 'pandas'\n",
202
+ " print('DuckDB unavailable, using pandas:', e)\n",
203
+ "\n",
204
+ "if engine == 'duckdb':\n",
205
+ " total_cve = con.execute(\"SELECT COUNT(*) FROM read_parquet(?)\", [str(PARQ/'cve.parquet')]).fetchone()[0]\n",
206
+ " total_kev = con.execute(\"SELECT COUNT(*) FROM read_parquet(?)\", [str(PARQ/'kev.parquet')]).fetchone()[0]\n",
207
+ "else:\n",
208
+ " import pandas as pd\n",
209
+ " total_cve = len(pd.read_parquet(PARQ/'cve.parquet'))\n",
210
+ " total_kev = len(pd.read_parquet(PARQ/'kev.parquet'))\n",
211
+ "print('rows:', {'cve': total_cve, 'kev': total_kev})\n"
212
+ ]
213
+ },
214
+ {
215
+ "cell_type": "code",
216
+ "execution_count": null,
217
+ "metadata": {},
218
+ "outputs": [],
219
+ "source": [
220
+ "# Accuracy panel\n",
221
+ "import os\n",
222
+ "val_path = DOCS / 'VALIDATION.json'\n",
223
+ "if val_path.exists():\n",
224
+ " validation = json.loads(val_path.read_text())\n",
225
+ " keys = [\n",
226
+ " 'counts',\n",
227
+ " 'cvss_v3_presence_ratio',\n",
228
+ " 'cwe_presence_ratio',\n",
229
+ " 'kev_cve_coverage_ratio',\n",
230
+ " 'kev_cve_coverage_ratio_within_window',\n",
231
+ " 'kev_rows_total_fetched',\n",
232
+ " 'kev_rows_within_window',\n",
233
+ " 'kev_rows_filtered_out',\n",
234
+ " 'kev_within_window_over_global_ratio',\n",
235
+ " 'url_shape_failures',\n",
236
+ " 'http_head_failures_hard',\n",
237
+ " 'http_head_failures_flaky',\n",
238
+ " 'dead_reference_links',\n",
239
+ " 'duplicate_edges_dropped',\n",
240
+ " 'snapshot_as_of',\n",
241
+ " ]\n",
242
+ " summary = {k: validation.get(k) for k in keys}\n",
243
+ " print(summary)\n",
244
+ "else:\n",
245
+ " # Minimal local signal if validation omitted\n",
246
+ " if engine == 'duckdb':\n",
247
+ " cvss_ratio = con.execute(\"\"\"\n",
248
+ " WITH t AS (\n",
249
+ " SELECT COUNT(*) AS n, SUM(CASE WHEN cvss_v3_score IS NOT NULL THEN 1 ELSE 0 END) AS v\n",
250
+ " FROM read_parquet(?)\n",
251
+ " ) SELECT CAST(v AS DOUBLE)/n FROM t\n",
252
+ " \"\"\", [str(PARQ/'nvd_meta.parquet')]).fetchone()[0]\n",
253
+ " else:\n",
254
+ " import pandas as pd\n",
255
+ " m = pd.read_parquet(PARQ/'nvd_meta.parquet')\n",
256
+ " cvss_ratio = float((m['cvss_v3_score'].notnull()).mean())\n",
257
+ " print({'cvss_v3_presence_ratio': cvss_ratio})\n"
258
+ ]
259
+ },
260
+ {
261
+ "cell_type": "code",
262
+ "execution_count": null,
263
+ "metadata": {},
264
+ "outputs": [],
265
+ "source": [
266
+ "# Provenance proof (sample rows)\n",
267
+ "if engine == 'duckdb':\n",
268
+ " df = con.execute(\"\"\"\n",
269
+ " SELECT c.cve_id, c.source, c.source_url, c.retrieved_at, c.source_record_hash\n",
270
+ " FROM read_parquet(?) c\n",
271
+ " ORDER BY c.cve_id\n",
272
+ " LIMIT 5\n",
273
+ " \"\"\", [str(PARQ/'cve.parquet')]).df()\n",
274
+ "else:\n",
275
+ " import pandas as pd\n",
276
+ " c = pd.read_parquet(PARQ/'cve.parquet', columns=['cve_id','source','source_url','retrieved_at','source_record_hash'])\n",
277
+ " df = c.sort_values('cve_id').head(5)\n",
278
+ "from IPython.display import display\n",
279
+ "display(df)\n"
280
+ ]
281
+ },
282
+ {
283
+ "cell_type": "code",
284
+ "execution_count": null,
285
+ "metadata": {},
286
+ "outputs": [],
287
+ "source": [
288
+ "# KEV triage (top 20 by CVSS)\n",
289
+ "if engine == 'duckdb':\n",
290
+ " df = con.execute(\"\"\"\n",
291
+ " SELECT c.cve_id, m.cvss_v3_score, k.date_added, k.notes\n",
292
+ " FROM read_parquet(?) k\n",
293
+ " JOIN read_parquet(?) c ON c.cve_id = k.cve_id\n",
294
+ " LEFT JOIN read_parquet(?) m ON m.cve_id = c.cve_id\n",
295
+ " ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC\n",
296
+ " LIMIT 20\n",
297
+ " \"\"\", [str(PARQ/'kev.parquet'), str(PARQ/'cve.parquet'), str(PARQ/'nvd_meta.parquet')]).df()\n",
298
+ "else:\n",
299
+ " import pandas as pd\n",
300
+ " k = pd.read_parquet(PARQ/'kev.parquet')\n",
301
+ " c = pd.read_parquet(PARQ/'cve.parquet')\n",
302
+ " m = pd.read_parquet(PARQ/'nvd_meta.parquet')\n",
303
+ " df = k.merge(c, on='cve_id').merge(m[['cve_id','cvss_v3_score']], on='cve_id', how='left')\n",
304
+ " df = df.sort_values(['cvss_v3_score','date_added'], ascending=[False, False]).head(20)\n",
305
+ "from IPython.display import display\n",
306
+ "# Export first CVE id for downstream default in citations\n",
307
+ "try:\n",
308
+ " DEFAULT_CVE_FOR_CITATIONS = df['cve_id'].iloc[0] if len(df) else None\n",
309
+ "except Exception:\n",
310
+ " DEFAULT_CVE_FOR_CITATIONS = None\n",
311
+ "display(df)\n"
312
+ ]
313
+ },
314
+ {
315
+ "cell_type": "code",
316
+ "execution_count": null,
317
+ "metadata": {},
318
+ "outputs": [],
319
+ "source": [
320
+ "# CWE pivot (top 20)\n",
321
+ "if engine == 'duckdb':\n",
322
+ " df = con.execute(\"\"\"\n",
323
+ " SELECT u.cwe, COUNT(*) AS cnt\n",
324
+ " FROM read_parquet(?) t, UNNEST(t.cwe_ids) AS u(cwe)\n",
325
+ " GROUP BY 1\n",
326
+ " ORDER BY cnt DESC\n",
327
+ " LIMIT 20\n",
328
+ " \"\"\", [str(PARQ/'nvd_meta.parquet')]).df()\n",
329
+ "else:\n",
330
+ " import pandas as pd\n",
331
+ " m = pd.read_parquet(PARQ/'nvd_meta.parquet')\n",
332
+ " rows = []\n",
333
+ " for _, r in m.iterrows():\n",
334
+ " for c in (r['cwe_ids'] or []):\n",
335
+ " rows.append(c)\n",
336
+ " import collections\n",
337
+ " cc = collections.Counter(rows)\n",
338
+ " df = pd.DataFrame({'cwe': list(cc.keys()), 'cnt': list(cc.values())}).sort_values('cnt', ascending=False).head(20)\n",
339
+ "from IPython.display import display\n",
340
+ "display(df)\n"
341
+ ]
342
+ },
343
+ {
344
+ "cell_type": "code",
345
+ "execution_count": null,
346
+ "metadata": {},
347
+ "outputs": [],
348
+ "source": [
349
+ "# Citations for a specific CVE\n",
350
+ "# Default: take the first CVE from KEV triage if available; otherwise use the placeholder below.\n",
351
+ "try:\n",
352
+ " TARGET\n",
353
+ "except NameError:\n",
354
+ " try:\n",
355
+ " TARGET = DEFAULT_CVE_FOR_CITATIONS # set by KEV triage cell\n",
356
+ " except NameError:\n",
357
+ " TARGET = None\n",
358
+ " if TARGET is None:\n",
359
+ " TARGET = 'CVE-2021-44228' # change as desired\n",
360
+ "print('TARGET:', TARGET, '(set TARGET to override)')\n",
361
+ "\n",
362
+ "if engine == 'duckdb':\n",
363
+ " df = con.execute(\"\"\"\n",
364
+ " SELECT dst_id AS reference_url\n",
365
+ " FROM read_parquet(?)\n",
366
+ " WHERE src_type='cve' AND src_id=? AND edge_type='cve_ref_url'\n",
367
+ " ORDER BY reference_url\n",
368
+ " \"\"\", [str(PARQ/'edges.parquet'), TARGET]).df()\n",
369
+ "else:\n",
370
+ " import pandas as pd\n",
371
+ " e = pd.read_parquet(PARQ/'edges.parquet')\n",
372
+ " df = (\n",
373
+ " e[(e['src_type']=='cve') & (e['src_id']==TARGET) & (e['edge_type']=='cve_ref_url')]\n",
374
+ " [['dst_id']].rename(columns={'dst_id':'reference_url'})\n",
375
+ " .sort_values('reference_url')\n",
376
+ " )\n",
377
+ "from IPython.display import display\n",
378
+ "display(df)\n"
379
+ ]
380
+ },
381
+ {
382
+ "cell_type": "code",
383
+ "execution_count": null,
384
+ "metadata": {},
385
+ "outputs": [],
386
+ "source": [
387
+ "# RAG config and retrieval (offline-only if model cached)\n",
388
+ "import pandas as pd\n",
389
+ "\n",
390
+ "# Read meta and print config\n",
391
+ "meta = pd.read_parquet(RAG/'meta.parquet')\n",
392
+ "assert bool(meta['normalize'][0]) and meta['metric'][0] == 'IP'\n",
393
+ "model_name = meta['model_name'][0]\n",
394
+ "dim = int(meta['dim'][0])\n",
395
+ "texts_count = int(meta.get('texts_count', pd.Series([None]))[0])\n",
396
+ "print({'model_name': model_name, 'dim': dim, 'normalize': True, 'metric': 'IP', 'texts_count': texts_count})\n",
397
+ "\n",
398
+ "# Enforce offline HF/Transformers and guard imports\n",
399
+ "import os\n",
400
+ "os.environ['HF_HUB_OFFLINE'] = '1'\n",
401
+ "os.environ['TRANSFORMERS_OFFLINE'] = '1'\n",
402
+ "\n",
403
+ "rag_enabled = True\n",
404
+ "try:\n",
405
+ " from sentence_transformers import SentenceTransformer\n",
406
+ " import faiss, numpy as np\n",
407
+ "except Exception as e:\n",
408
+ " print('RAG disabled (missing sentence-transformers or faiss):', e)\n",
409
+ " rag_enabled = False\n",
410
+ "\n",
411
+ "if rag_enabled:\n",
412
+ " try:\n",
413
+ " model = SentenceTransformer(model_name)\n",
414
+ " index = faiss.read_index(str(RAG/'index.faiss'))\n",
415
+ " id_map = pd.read_parquet(RAG/'mapping.parquet')\n",
416
+ "\n",
417
+ " query = 'recent OpenSSL remote exploit'\n",
418
+ " qvec = model.encode([query], normalize_embeddings=True)\n",
419
+ " D, I = index.search(np.asarray(qvec, dtype='float32'), 10)\n",
420
+ " print('scores:', D[0].tolist())\n",
421
+ " from IPython.display import display\n",
422
+ " hits = id_map[id_map['row_index'].isin(I[0].tolist())].merge(\n",
423
+ " pd.DataFrame({'row_index': I[0].tolist()}), on='row_index', how='right'\n",
424
+ " )\n",
425
+ " display(hits)\n",
426
+ " except Exception as e:\n",
427
+ " print('RAG skipped (model not cached or index missing):', e)\n",
428
+ " print('Tip: pre-cache once online, then re-run offline:')\n",
429
+ " print(\"from sentence_transformers import SentenceTransformer; SentenceTransformer('BAAI/bge-small-en-v1.5')\")\n"
430
+ ]
431
+ },
432
+ {
433
+ "cell_type": "code",
434
+ "execution_count": null,
435
+ "metadata": {},
436
+ "outputs": [],
437
+ "source": [
438
+ "# Consistency checks (fast)\n",
439
+ "if engine == 'duckdb':\n",
440
+ " kev_total = con.execute(\"SELECT COUNT(*) FROM read_parquet(?)\", [str(PARQ/'kev.parquet')]).fetchone()[0]\n",
441
+ " kev_without_cve = con.execute(\"\"\"\n",
442
+ " SELECT COUNT(*) FROM read_parquet(?) k\n",
443
+ " LEFT JOIN read_parquet(?) c ON c.cve_id = k.cve_id\n",
444
+ " WHERE c.cve_id IS NULL\n",
445
+ " \"\"\", [str(PARQ/'kev.parquet'), str(PARQ/'cve.parquet')]).fetchone()[0]\n",
446
+ "\n",
447
+ " edges_with_missing_cve = con.execute(\"\"\"\n",
448
+ " SELECT COUNT(*) FROM read_parquet(?) e\n",
449
+ " LEFT JOIN read_parquet(?) c ON c.cve_id = e.src_id\n",
450
+ " WHERE e.src_type='cve' AND c.cve_id IS NULL\n",
451
+ " \"\"\", [str(PARQ/'edges.parquet'), str(PARQ/'cve.parquet')]).fetchone()[0]\n",
452
+ "\n",
453
+ " sample_missing = [r[0] for r in con.execute(\"\"\"\n",
454
+ " SELECT k.cve_id\n",
455
+ " FROM read_parquet(?) k\n",
456
+ " LEFT JOIN read_parquet(?) c ON c.cve_id = k.cve_id\n",
457
+ " WHERE c.cve_id IS NULL\n",
458
+ " ORDER BY k.cve_id\n",
459
+ " LIMIT 5\n",
460
+ " \"\"\", [str(PARQ/'kev.parquet'), str(PARQ/'cve.parquet')]).fetchall()]\n",
461
+ "\n",
462
+ " kev_with_cve = int(kev_total) - int(kev_without_cve)\n",
463
+ " coverage_ratio = (kev_with_cve / kev_total) if kev_total else 0.0\n",
464
+ "\n",
465
+ " print({\n",
466
+ " 'kev_total': int(kev_total),\n",
467
+ " 'kev_with_cve': int(kev_with_cve),\n",
468
+ " 'kev_without_cve': int(kev_without_cve),\n",
469
+ " 'kev_cve_coverage_ratio': coverage_ratio,\n",
470
+ " 'edges_with_missing_cve': int(edges_with_missing_cve),\n",
471
+ " 'sample_missing_cves': sample_missing,\n",
472
+ " })\n",
473
+ "else:\n",
474
+ " print('Consistency checks require DuckDB for speed; skipped.')\n"
475
+ ]
476
+ }
477
+ ],
478
+ "metadata": {
479
+ "language_info": {
480
+ "name": "python"
481
+ }
482
+ },
483
+ "nbformat": 4,
484
+ "nbformat_minor": 2
485
+ }
demo/requirements-colab.txt ADDED
@@ -0,0 +1,8 @@
 
 
 
 
 
 
 
 
 
1
+ duckdb>=1.0.0
2
+ pandas>=2.0.0
3
+ pyarrow>=15.0.0
4
+ numpy>=1.26.0
5
+ faiss-cpu>=1.7.4
6
+ sentence-transformers<3.0.0
7
+ huggingface_hub>=0.20.0
8
+
docs/BUILD_MANIFEST.json ADDED
@@ -0,0 +1 @@
 
 
1
+ {"snapshot_as_of":"2025-10-29T13:51:37Z","build_started_at":"2025-10-29T17:49:43Z","build_finished_at":"2025-10-29T17:49:43Z","python_version":"3.12.2","platform":"macOS-15.6.1-arm64-arm-64bit","os_release":"24.6.0","packages":{},"model_name":"BAAI/bge-small-en-v1.5","model_dim":384,"nvd_window_days":90,"git_commit":"d5ac518dcf3118f1c02eed15d147f71f23e0c3ea"}
docs/INTEGRITY.txt ADDED
@@ -0,0 +1,11 @@
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 2813808c65fde193a159b6ae5d101e66c35995a03bbc38f33057e0592c92d2a0 docs/VALIDATION.json
2
+ 4c26c49fac2c2288ed78fce5e1620cfa9b36320a393543ae939d1533e0cf35da parquet/.counts.json
3
+ 1224f3dd4152fb70e523a47bf244ba01582445fa25ff1b2a4000b2847e06f6f1 parquet/cve.parquet
4
+ 036f9af67420d301078c4a88f1caa4eda1c63354e429d8ea73198617b8c5c911 parquet/edges.parquet
5
+ 6268b8d528b37604dc8846e8a19c212dcd85d61dee9542d1d79ea92e6eeef1fc parquet/kev.parquet
6
+ a6ad1ddf69d59486a91850d5b0ea810bf181c7c6b10830adbc38d80da908de03 parquet/nvd_meta.parquet
7
+ d07b58ecb437b479af8a02fc49f46f80166ccdd2c2f4abd1418e207cda38e84a parquet/preview.parquet
8
+ b60669f24f2050cd441139a4f58dc07d2e2e8330ebce75fc3b88ebc44f6e557c rag/index.faiss
9
+ 380b434b36326888988f02fe47dff53e4a8b079a563e8352477c3ff8a3623052 rag/mapping.parquet
10
+ 95c0c3c104e28012ebf0cbacbf20346d992a6ed3960aa9792a6436743de726f3 rag/meta.parquet
11
+ 9dd9c208dc7bceef09351a5b3e807bf50e7f5e0a5e51c4768e65b29634c4fca6 rag/vectors.npy
docs/LICENCE.md ADDED
@@ -0,0 +1,121 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Creative Commons Legal Code
2
+
3
+ CC0 1.0 Universal
4
+
5
+ CREATIVE COMMONS CORPORATION IS NOT A LAW FIRM AND DOES NOT PROVIDE
6
+ LEGAL SERVICES. DISTRIBUTION OF THIS DOCUMENT DOES NOT CREATE AN
7
+ ATTORNEY-CLIENT RELATIONSHIP. CREATIVE COMMONS PROVIDES THIS
8
+ INFORMATION ON AN "AS-IS" BASIS. CREATIVE COMMONS MAKES NO WARRANTIES
9
+ REGARDING THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS
10
+ PROVIDED HEREUNDER, AND DISCLAIMS LIABILITY FOR DAMAGES RESULTING FROM
11
+ THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS PROVIDED
12
+ HEREUNDER.
13
+
14
+ Statement of Purpose
15
+
16
+ The laws of most jurisdictions throughout the world automatically confer
17
+ exclusive Copyright and Related Rights (defined below) upon the creator
18
+ and subsequent owner(s) (each and all, an "owner") of an original work of
19
+ authorship and/or a database (each, a "Work").
20
+
21
+ Certain owners wish to permanently relinquish those rights to a Work for
22
+ the purpose of contributing to a commons of creative, cultural and
23
+ scientific works ("Commons") that the public can reliably and without fear
24
+ of later claims of infringement build upon, modify, incorporate in other
25
+ works, reuse and redistribute as freely as possible in any form whatsoever
26
+ and for any purposes, including without limitation commercial purposes.
27
+ These owners may contribute to the Commons to promote the ideal of a free
28
+ culture and the further production of creative, cultural and scientific
29
+ works, or to gain reputation or greater distribution for their Work in
30
+ part through the use and efforts of others.
31
+
32
+ For these and/or other purposes and motivations, and without any
33
+ expectation of additional consideration or compensation, the person
34
+ associating CC0 with a Work (the "Affirmer"), to the extent that he or she
35
+ is an owner of Copyright and Related Rights in the Work, voluntarily
36
+ elects to apply CC0 to the Work and publicly distribute the Work under its
37
+ terms, with knowledge of his or her Copyright and Related Rights in the
38
+ Work and the meaning and intended legal effect of CC0 on those rights.
39
+
40
+ 1. Copyright and Related Rights. A Work made available under CC0 may be
41
+ protected by copyright and related or neighboring rights ("Copyright and
42
+ Related Rights"). Copyright and Related Rights include, but are not
43
+ limited to, the following:
44
+ i. the right to reproduce, adapt, distribute, perform, display,
45
+ communicate, and translate a Work;
46
+ ii. moral rights retained by the original author(s) and/or performer(s);
47
+ iii. publicity and privacy rights pertaining to a person's image or
48
+ likeness depicted in a Work;
49
+ iv. rights protecting against unfair competition in regards to a Work,
50
+ subject to the limitations in paragraph 4(a), below;
51
+ v. rights protecting the extraction, dissemination, use and reuse of
52
+ data in a Work;
53
+ vi. database rights (such as those arising under Directive 96/9/EC of
54
+ the European Parliament and of the Council of 11 March 1996 on the
55
+ legal protection of databases, and under any national implementation
56
+ thereof, including any amended or successor version of such
57
+ directive); and
58
+ vii. other similar, equivalent or corresponding rights throughout the
59
+ world based on applicable law or treaty, and any national
60
+ implementations thereof.
61
+
62
+ 2. Waiver. To the greatest extent permitted by, but not in contravention
63
+ of, applicable law, Affirmer hereby overtly, fully, permanently,
64
+ irrevocably and unconditionally waives, abandons, and surrenders all of
65
+ Affirmer's Copyright and Related Rights and associated claims and causes
66
+ of action, whether now known or unknown (including existing as well as
67
+ future claims and causes of action), in the Work (i) in all territories
68
+ worldwide, (ii) for the maximum duration provided by applicable law or
69
+ treaty (including future time extensions), (iii) in any current or future
70
+ medium and for any number of copies, and (iv) for any purpose whatsoever,
71
+ including without limitation commercial, advertising or promotional
72
+ purposes (the "Waiver"). Affirmer makes the Waiver for the benefit of each
73
+ member of the public at large and to the detriment of Affirmer's heirs and
74
+ successors, fully intending that such Waiver shall not be subject to
75
+ revocation, rescission, cancellation, termination, or any other legal or
76
+ equitable action to disrupt the quiet enjoyment of the Work by the public
77
+ as contemplated by Affirmer's express Statement of Purpose.
78
+
79
+ 3. Public License Fallback. Should any part of the Waiver for any reason
80
+ be judged legally invalid or ineffective under applicable law, then the
81
+ Waiver shall be preserved to the maximum extent permitted taking into
82
+ account Affirmer's express Statement of Purpose. In addition, to the
83
+ extent the Waiver is so judged Affirmer hereby grants to each affected
84
+ person a royalty-free, non transferable, non sublicensable, non exclusive,
85
+ irrevocable and unconditional license to exercise Affirmer's Copyright and
86
+ Related Rights in the Work (i) in all territories worldwide, (ii) for the
87
+ maximum duration provided by applicable law or treaty (including future
88
+ time extensions), (iii) in any current or future medium and for any number
89
+ of copies, and (iv) for any purpose whatsoever, including without
90
+ limitation commercial, advertising or promotional purposes (the
91
+ "License"). The License shall be deemed effective as of the date CC0 was
92
+ applied by Affirmer to the Work. Should any part of the License for any
93
+ reason be judged legally invalid or ineffective under applicable law, such
94
+ partial invalidity or ineffectiveness shall not invalidate the remainder
95
+ of the License, and in such case Affirmer hereby affirms that he or she
96
+ will not (i) exercise any of his or her remaining Copyright and Related
97
+ Rights in the Work or (ii) assert any associated claims and causes of
98
+ action with respect to the Work, in either case contrary to Affirmer's
99
+ express Statement of Purpose.
100
+
101
+ 4. Limitations and Disclaimers.
102
+ a. No trademark or patent rights held by Affirmer are waived, abandoned,
103
+ surrendered, licensed or otherwise affected by this document.
104
+ b. Affirmer offers the Work as-is and makes no representations or
105
+ warranties of any kind concerning the Work, express, implied,
106
+ statutory or otherwise, including without limitation warranties of
107
+ title, merchantability, fitness for a particular purpose, non
108
+ infringement, or the absence of latent or other defects, accuracy, or
109
+ the present or absence of errors, whether or not discoverable, all to
110
+ the greatest extent permissible under applicable law.
111
+ c. Affirmer disclaims responsibility for clearing rights of other persons
112
+ that may apply to the Work or any use thereof, including without
113
+ limitation any person's Copyright and Related Rights in the Work.
114
+ Further, Affirmer disclaims responsibility for obtaining any necessary
115
+ consents, permissions or other rights required for any use of the
116
+ Work.
117
+ d. Affirmer understands and acknowledges that Creative Commons is not a
118
+ party to this document and has no duty or obligation with respect to
119
+ this CC0 or use of the Work.
120
+
121
+
docs/LICENSES.md ADDED
@@ -0,0 +1,41 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ## Licenses and Source Status
2
+
3
+ Snapshot timestamp (UTC): 2025-10-29T13:51:37Z
4
+
5
+ ### Compiled artifact license (this dataset)
6
+
7
+ - License: CC0 1.0 Universal (Public Domain Dedication)
8
+ - Intent: Dedicate the compiled snapshot to the public domain.
9
+ - See: `https://creativecommons.org/publicdomain/zero/1.0/`
10
+
11
+ ### Upstream sources included in the core snapshot
12
+
13
+ - NVD (National Vulnerability Database)
14
+ - Status: Public Domain (U.S. Government work; not subject to copyright)
15
+ - Site: `https://nvd.nist.gov`
16
+ - Notes: The snapshot includes minimal, factual metadata derived from NVD records (e.g., CVE IDs, short descriptions, CVSS/CWE, reference URLs). Reference URLs are preserved exactly.
17
+ - Additional note: NVD data are U.S. Government works (public domain). Some material may be subject to foreign copyright.
18
+
19
+ - CISA Known Exploited Vulnerabilities (KEV) Catalog
20
+ - License: CC0 1.0
21
+ - Site: `https://www.cisa.gov/known-exploited-vulnerabilities-catalog`
22
+ - License text: `https://www.cisa.gov/sites/default/files/licenses/kev/license.txt`
23
+ - Notes: The snapshot includes KEV fields such as `cveID`, `dateAdded`, and `notes`.
24
+
25
+ ### Explicit exclusions (not part of the core snapshot)
26
+
27
+ - GitHub Security Advisories (GHSA): CC-BY-4.0; attribution required. Excluded from the core to keep the artifact PD/CC0-only.
28
+ - OSV (Open Source Vulnerabilities): licenses vary by upstream source. Excluded from the core to avoid mixed licensing.
29
+
30
+ ### RAG pack content
31
+
32
+ - The retrieval index (FAISS) is constructed only from PD/CC0 text fields (NVD short descriptions and KEV notes).
33
+
34
+ ### Notes
35
+
36
+ - This file summarizes license posture for the released snapshot: PD/CC0-only inputs, compiled artifact dedicated under CC0 1.0.
37
+ - See `NOTICE.md` for non-affiliation and warranty disclaimers.
38
+
39
+ ### Scope
40
+
41
+ This licensing summary applies to the **dataset** only. Any code or notebooks in this repository (if present) are licensed separately; see the license file at the repository root (e.g., MIT).
docs/NOTICE.md ADDED
@@ -0,0 +1,25 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ## Notice
2
+
3
+ Snapshot timestamp (UTC): 2025-10-29T13:51:37Z
4
+
5
+ ### Non-affiliation
6
+
7
+ - This project is not affiliated with NIST/NVD, CISA/KEV, FIRST/EPSS, or any of their programs. Names and links are used for descriptive purposes only.
8
+ - NVD non-endorsement: "This product uses data from the NVD API but is not endorsed or certified by the NVD."
9
+ - All product names, logos, and brands are property of their respective owners; use here is for identification only and does not imply endorsement.
10
+
11
+ ### Warranty and usage
12
+
13
+ - WITHOUT WARRANTIES OF ANY KIND, express or implied, including merchantability, fitness for a particular purpose, and non-infringement. Verify with linked official sources before relying operationally.
14
+ - The snapshot is an immutable, one-time data drop intended for evaluation, prototyping, and research.
15
+ - No SLA or support is provided. Issues/Discussions are welcome for feedback only.
16
+
17
+ ### Licensing summary
18
+
19
+ - The compiled artifact is dedicated to the public domain under CC0 1.0.
20
+ - Inputs are PD/CC0-only (NVD public domain; CISA KEV under CC0). Attribution-required sources (e.g., GHSA/OSV) are intentionally excluded from the core snapshot.
21
+ - Linked third-party pages (vendor advisories, blogs, etc.) are not covered by this dataset’s CC0 dedication; their terms apply.
22
+
23
+ ### Integrity and transparency
24
+
25
+ - Verify `docs/INTEGRITY.txt` (SHA-256 list) using standard tools.
docs/VALIDATION.json ADDED
@@ -0,0 +1 @@
 
 
1
+ {"counts":{"cve_rows":12307,"nvd_meta_rows":12307,"kev_rows":28,"edges_rows":44035},"row_counts":{"cve.parquet":12307,"nvd_meta.parquet":12307,"kev.parquet":28,"edges.parquet":44035},"cvss_v3_presence_ratio":0.760137,"cwe_presence_ratio":0.827659,"kev_cve_coverage_ratio":1.0,"kev_cve_coverage_ratio_within_window":1.0,"rejected_cve_count":103,"duplicate_edges_dropped":2027,"edges_with_missing_cve":0,"url_malformed_count":0,"url_timeout_count":5487,"url_http_error_count":744,"url_forbidden_or_method_not_allowed_count":1502,"dead_reference_links":6231,"url_shape_failures":0,"http_head_failures_hard":744,"http_head_failures_flaky":5487,"kev_rows_total_fetched":1451,"kev_rows_within_window":28,"kev_rows_filtered_out":1423,"kev_within_window_over_global_ratio":0.019297,"url_checks_performed":true,"url_checks_sampled":false,"url_checks_evaluated":33233,"snapshot_as_of":"2025-10-29T13:51:37Z"}
parquet/.counts.json ADDED
@@ -0,0 +1 @@
 
 
1
+ {"duplicate_edges_dropped": 2027, "kev_rows_total_fetched": 1451, "kev_rows_within_window": 28}
parquet/cve.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1224f3dd4152fb70e523a47bf244ba01582445fa25ff1b2a4000b2847e06f6f1
3
+ size 4266133
parquet/edges.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:036f9af67420d301078c4a88f1caa4eda1c63354e429d8ea73198617b8c5c911
3
+ size 1032955
parquet/kev.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6268b8d528b37604dc8846e8a19c212dcd85d61dee9542d1d79ea92e6eeef1fc
3
+ size 8427
parquet/nvd_meta.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a6ad1ddf69d59486a91850d5b0ea810bf181c7c6b10830adbc38d80da908de03
3
+ size 1862384
parquet/preview.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d07b58ecb437b479af8a02fc49f46f80166ccdd2c2f4abd1418e207cda38e84a
3
+ size 163537
rag/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b60669f24f2050cd441139a4f58dc07d2e2e8330ebce75fc3b88ebc44f6e557c
3
+ size 18946605
rag/mapping.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:380b434b36326888988f02fe47dff53e4a8b079a563e8352477c3ff8a3623052
3
+ size 159446
rag/meta.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:95c0c3c104e28012ebf0cbacbf20346d992a6ed3960aa9792a6436743de726f3
3
+ size 1495
rag/vectors.npy ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9dd9c208dc7bceef09351a5b3e807bf50e7f5e0a5e51c4768e65b29634c4fca6
3
+ size 18946688