Update README.md
Browse files
README.md
CHANGED
@@ -37,6 +37,7 @@ This model is trained to identify SQL injection attacks, which are a type of cod
|
|
37 |
To use the SQL Injection Classifier model, you can follow the code snippet below. This example demonstrates how to predict whether a given SQL query is normal or an injection attack.
|
38 |
|
39 |
```python
|
|
|
40 |
from unsloth import FastLanguageModel
|
41 |
from transformers import AutoTokenizer
|
42 |
|
@@ -101,6 +102,7 @@ Users (both direct and downstream) should be aware of the potential risks of rel
|
|
101 |
!pip install unsloth
|
102 |
|
103 |
%%writefile app.py
|
|
|
104 |
import streamlit as st
|
105 |
from unsloth import FastLanguageModel
|
106 |
from transformers import AutoTokenizer
|
|
|
37 |
To use the SQL Injection Classifier model, you can follow the code snippet below. This example demonstrates how to predict whether a given SQL query is normal or an injection attack.
|
38 |
|
39 |
```python
|
40 |
+
# 1=sql injection query and 0=normal sql query
|
41 |
from unsloth import FastLanguageModel
|
42 |
from transformers import AutoTokenizer
|
43 |
|
|
|
102 |
!pip install unsloth
|
103 |
|
104 |
%%writefile app.py
|
105 |
+
# 1=sql injection query and 0=normal sql query
|
106 |
import streamlit as st
|
107 |
from unsloth import FastLanguageModel
|
108 |
from transformers import AutoTokenizer
|