Pramod Prasad
|
095cee1140
|
🔒 [Security Fix] Replace exec() with subprocess.run() to prevent arbitrary code execution- Replaced unsafe calls in evaluation scripts to enhance security.- Updated files: - (Line 64) - (Line 64) - (Line 64) - (Line 37)- Implemented for controlled execution.- Added exception handling to catch potential execution errors.- This update mitigates the risk of arbitrary code execution and enhances system security.✅ Recommended: Test all affected evaluation modules to ensure functionality remains intact.
|
2025-01-29 12:10:28 +00:00 |
|
Dejian Yang
|
c160d96860
|
fix add_generation_prompt in latest version
|
2024-01-09 21:55:21 +08:00 |
|
Yang Dejian
|
94c476e295
|
fix test file
|
2023-11-23 16:46:17 +08:00 |
|
Yang Dejian
|
d40caedfdf
|
add mbpp instruct eval
|
2023-11-23 15:22:39 +08:00 |
|
ZHU QIHAO
|
13d5e4864d
|
Update README.md
|
2023-11-03 09:27:58 +08:00 |
|
ZHU QIHAO
|
be5b45bf16
|
Update README.md
|
2023-11-03 00:29:22 +08:00 |
|
Dejian
|
a4ba628dfd
|
init project
|
2023-11-02 22:07:09 +08:00 |
|