henry-1.6-commit

This commit is contained in:
2024-11-02 12:14:46 +08:00
parent f9c69cbd47
commit f2fc600fea
32 changed files with 3439 additions and 294 deletions

View File

@@ -12,7 +12,7 @@
"name": "strcpy",
"prompt": {
"role": "user",
"content": "Please analyze the following code to determine if the strcpy used in the program poses a risk of buffer overflow. If it actually exists then answer with 'yes, reason here', or else output 'no strcpy vulnerability'.\n{code}"
"content": "Please analyze the following code to determine if the strcpy used in the program poses a risk of overflow. If it actually exists then answer with 'yes, reason here', or else output 'no strcpy vulnerability'.\n{code}"
}
},
{
@@ -28,7 +28,7 @@
"name": "strcpy",
"prompt": {
"role": "user",
"content": "According to struct Node info determine how many size should I set for strncpy which will be used to replace strcpy and only consider add function. Answer with 'size=value(decimal), ', and then give me the reason.\n{code}"
"content": "how many size should I set for strncpy in add function which will be used to replace strcpy. Answer with 'size=value(decimal), ', and then give me the reason.\n{code}"
}
},
{
@@ -36,7 +36,7 @@
"name": "recv",
"prompt": {
"role": "user",
"content": "Please analyze whether the following program contains the risk of buffer overflow and only check recv function. If it actually exists then answer with 'yes, reason here', or else output 'no recv vulnerability'.\n{code}"
"content": "Please analyze whether the following program contains the risk of overflow and only check recv function. If it actually exists then answer with 'yes, reason here', or else output 'no recv vulnerability'.\n{code}"
}
},
{