Pramod Prasad
|
095cee1140
|
🔒 [Security Fix] Replace exec() with subprocess.run() to prevent arbitrary code execution- Replaced unsafe calls in evaluation scripts to enhance security.- Updated files: - (Line 64) - (Line 64) - (Line 64) - (Line 37)- Implemented for controlled execution.- Added exception handling to catch potential execution errors.- This update mitigates the risk of arbitrary code execution and enhances system security.✅ Recommended: Test all affected evaluation modules to ensure functionality remains intact.
|
2025-01-29 12:10:28 +00:00 |
|
chuyuanpeng
|
6590983bf0
|
Fix the position of add_generation_prompt
|
2024-01-10 17:18:24 +08:00 |
|
Dejian Yang
|
c160d96860
|
fix add_generation_prompt in latest version
|
2024-01-09 21:55:21 +08:00 |
|
Talmeez Fuaad
|
020e786bb8
|
Update eval_instruct.py
|
2023-11-26 17:11:21 +05:00 |
|
DejianYang
|
cae2ab3765
|
Update instruct model evaluation in README.md
|
2023-11-10 17:47:42 +08:00 |
|
Yang Dejian
|
9c2bc4ec5e
|
remove pycache
|
2023-11-09 22:52:37 +08:00 |
|
Yang Dejian
|
f911009816
|
update eval_instruct.py
|
2023-11-09 22:48:51 +08:00 |
|
Yang Dejian
|
118e71a1af
|
add instruction model eval script
|
2023-11-04 17:39:04 +08:00 |
|
ZHU QIHAO
|
b5caaa40dd
|
Update README.md
|
2023-11-03 09:27:13 +08:00 |
|
Dejian
|
8762a24e10
|
update result.jpeg
|
2023-11-02 22:11:25 +08:00 |
|
Dejian
|
a4ba628dfd
|
init project
|
2023-11-02 22:07:09 +08:00 |
|