Skip to content

Commit 126d93a

Browse files
authored
Merge pull request #1916 from zapbot/update-site-content
2 parents cdd730e + f54fc6f commit 126d93a

File tree

7 files changed

+32
-32
lines changed

7 files changed

+32
-32
lines changed

addons/index.html

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1342,7 +1342,7 @@ <h1 class="text--white">ZAP Marketplace</h1>
13421342
<a class="no-border" title="Repository" href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon" target="_blank" rel="noopener noreferrer"><img alt="Repository" src="/img/addons/source.png" /></a>
13431343

13441344

1345-
<a class="no-border" title="Download" href="https://github.com/zaproxy-addons/fuzzai/releases/download/v0.0.2/fuzzai-alpha-0.0.2.zap" target="_blank" rel="noopener noreferrer"><img alt="Download" src="/img/addons/download.png" /></a>
1345+
<a class="no-border" title="Download" href="https://github.com/zaproxy-addons/fuzzai/releases/download/v0.0.3/fuzzai-alpha-0.0.3.zap" target="_blank" rel="noopener noreferrer"><img alt="Download" src="/img/addons/download.png" /></a>
13461346

13471347

13481348

@@ -1355,7 +1355,7 @@ <h1 class="text--white">ZAP Marketplace</h1>
13551355
fuzzai
13561356
</td>
13571357
<td align="center">
1358-
0.0.2
1358+
0.0.3
13591359
</td>
13601360
<td >
13611361
alpha
@@ -1364,7 +1364,7 @@ <h1 class="text--white">ZAP Marketplace</h1>
13641364
Marios Gyftos &amp; Yiannis Pavlosoglou
13651365
</td>
13661366
<td align="center">
1367-
2025-11-04
1367+
2025-11-06
13681368
</td>
13691369
</tr>
13701370

docs/desktop/addons/fuzzai-files/exploit-model-memory/index.html

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1873,7 +1873,7 @@ <h3 id="001-inject-context-memory">001 Inject Context Memory <a class="header-li
18731873
<li>Contradiction chaining: introduce contradictory facts early, then prompt for reconciliation to observe which facts the model favors.</li>
18741874
</ul>
18751875
<p>Examples of checks performed by validators: persistence of injected instruction across follow-ups, acceptance of contradictory prior facts as truth, and unexpected privilege escalation after context injection.</p>
1876-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/exploit-model-memory/001-inject-context-memory.txt">001-inject-context-memory.txt</a></p>
1876+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/exploit-model-memory/001-inject-context-memory.txt">001-inject-context-memory.txt</a></p>
18771877
<p>Author:</p>
18781878
<ul>
18791879
<li><a href="mailto:[email protected]">[email protected]</a> &amp; <a href="mailto:[email protected]">[email protected]</a></li>
@@ -1892,7 +1892,7 @@ <h3 id="002-persist-behavior-memory">002 Persist Behavior Memory <a class="heade
18921892
<li>Cache/proxy abuse patterns: use headers, cookies, or file uploads to test whether transient artifacts become persistent state.</li>
18931893
</ul>
18941894
<p>Validators look for measurable behavior changes after repeated inputs, unexpected continuity between sessions, and emergence of previously unseen response patterns consistent with the injected training signals.</p>
1895-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/exploit-model-memory/002-persist-behavior-memory.txt">002-persist-behavior-memory.txt</a></p>
1895+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/exploit-model-memory/002-persist-behavior-memory.txt">002-persist-behavior-memory.txt</a></p>
18961896
<p>Author:</p>
18971897
<ul>
18981898
<li><a href="mailto:[email protected]">[email protected]</a> &amp; <a href="mailto:[email protected]">[email protected]</a></li>
@@ -1911,7 +1911,7 @@ <h3 id="003-corrupt-token-history">003 Corrupt Token History <a class="header-li
19111911
<li>Decoder-policy stress: craft sequences that encourage the model to favor likelihood shortcuts over guardrail checks.</li>
19121912
</ul>
19131913
<p>Validators check for decoder exceptions, unexpected deterministic outputs under varying temperatures, safety-filter bypass correlated with token corruption, and any leakage triggered by token-sequence anomalies.</p>
1914-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/exploit-model-memory/003-corrupt-token-history.txt">003-corrupt-token-history.txt</a></p>
1914+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/exploit-model-memory/003-corrupt-token-history.txt">003-corrupt-token-history.txt</a></p>
19151915
<p>Author:</p>
19161916
<ul>
19171917
<li><a href="mailto:[email protected]">[email protected]</a> &amp; <a href="mailto:[email protected]">[email protected]</a></li>

docs/desktop/addons/fuzzai-files/extract-model-info/index.html

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1872,7 +1872,7 @@ <h3 id="001-architecture">001 Architecture <a class="header-link" href="#001-arc
18721872
and alarm thresholds for unauthorized access.</p>
18731873
<p>Payloads simulate scenarios where model training data security may be compromised.
18741874
Expected system behavior is detailed for each scenario.</p>
1875-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/001-architecture.txt">001-architecture.txt</a></p>
1875+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/001-architecture.txt">001-architecture.txt</a></p>
18761876
<p>Author:</p>
18771877
<ul>
18781878
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1886,7 +1886,7 @@ <h3 id="002-hyperparams">002 Hyperparams <a class="header-link" href="#002-hyper
18861886
Optimizer and hyperparameters - Probes for optimizer types, momentum, beta values, and weight decay settings.
18871887
Training specifics - Queries related to batch size, epochs, gradient clipping, and dropout rates.
18881888
Training techniques - Attempts to infer whether early stopping, data augmentation, or mixed-precision training were used.</p>
1889-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/002-hyperparams.txt">002-hyperparams.txt</a></p>
1889+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/002-hyperparams.txt">002-hyperparams.txt</a></p>
18901890
<p>Author:</p>
18911891
<ul>
18921892
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1904,7 +1904,7 @@ <h3 id="003-prompt-based-extraction">003 Prompt Based Extraction <a class="heade
19041904
or error messages.
19051905
Social media data - Payloads focus on revealing memorized handles, conversations,
19061906
or other user-generated content.</p>
1907-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/003-prompt-based-extraction.txt">003-prompt-based-extraction.txt</a></p>
1907+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/003-prompt-based-extraction.txt">003-prompt-based-extraction.txt</a></p>
19081908
<p>Author:</p>
19091909
<ul>
19101910
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1919,7 +1919,7 @@ <h3 id="004-conditional-prompts">004 Conditional Prompts <a class="header-link"
19191919
medical, or scientific content.
19201920
Sensitive information prevention - The payloads test if the model can provide high-level, generalized
19211921
responses without revealing memorized or proprietary data.</p>
1922-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/004-conditional-prompts.txt">004-conditional-prompts.txt</a></p>
1922+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/004-conditional-prompts.txt">004-conditional-prompts.txt</a></p>
19231923
<p>Author:</p>
19241924
<ul>
19251925
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1931,7 +1931,7 @@ <h3 id="005-adversarial-ml">005 Adversarial ML <a class="header-link" href="#005
19311931
<p>Data extraction for adversarial retraining - Payloads focus on retrieving training-specific data that could be used to train adversarial models.
19321932
Exploiting misclassifications - Prompts target incorrect classifications and vulnerabilities in datasets to generate adversarial inputs.
19331933
Adversarial text generation - Some payloads are aimed at crafting text that could be used to deceive systems like chatbots, spam filters, or medical models.</p>
1934-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/005-adversarial-ml.txt">005-adversarial-ml.txt</a></p>
1934+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/005-adversarial-ml.txt">005-adversarial-ml.txt</a></p>
19351935
<p>Author:</p>
19361936
<ul>
19371937
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1947,7 +1947,7 @@ <h3 id="006-ip-theft">006 IP Theft <a class="header-link" href="#006-ip-theft"><
19471947
optimization, and deployment strategies.
19481948
Energy efficiency and performance - Queries also focus on proprietary methods that optimize performance and
19491949
energy consumption in large models.</p>
1950-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/006-ip-theft.txt">006-ip-theft.txt</a></p>
1950+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/006-ip-theft.txt">006-ip-theft.txt</a></p>
19511951
<p>Author:</p>
19521952
<ul>
19531953
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1959,7 +1959,7 @@ <h3 id="007-data-privacy">007 Data Privacy <a class="header-link" href="#007-dat
19591959
<p>Model metadata extraction - These prompts focus on extracting information about who developed and trained the model, as well as organizational and proprietary details.
19601960
Training process details - Probes target information related to the data annotation process, privacy practices, and collaborators involved in training.
19611961
Security and infrastructure - Payloads focus on extracting information about hardware infrastructure, funding, and data privacy handling during training.</p>
1962-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/007-data-privacy.txt">007-data-privacy.txt</a></p>
1962+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/007-data-privacy.txt">007-data-privacy.txt</a></p>
19631963
<p>Author:</p>
19641964
<ul>
19651965
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1978,7 +1978,7 @@ <h3 id="008-visual-representation-leakage">008 Visual Representation Leakage <a
19781978
related to optimizer types, batch sizes, dropout, and regularization techniques.
19791979
Convergence and training dynamics - Several payloads probe for insights into learning rates, training durations, and
19801980
hyperparameter tuning through visual patterns in plots.</p>
1981-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/008-visual-representation-leakage.txt">008-visual-representation-leakage.txt</a></p>
1981+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/008-visual-representation-leakage.txt">008-visual-representation-leakage.txt</a></p>
19821982
<p>Author:</p>
19831983
<ul>
19841984
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1990,7 +1990,7 @@ <h3 id="009-privacy-violations">009 Privacy Violations <a class="header-link" hr
19901990
<p>Sensitive information extraction - These prompts focus on extracting PII (e.g., names, email addresses, financial data, social security numbers) and confidential business information.
19911991
Data privacy violations - The payloads aim to assess whether the model can inadvertently leak training data that leads to privacy breaches, identity theft, or reputational damage.
19921992
Protected healthcare and legal data - Prompts target sensitive health records, legal contracts, and proprietary business strategies.</p>
1993-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/009-privacy-violations.txt">009-privacy-violations.txt</a></p>
1993+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-model-information/009-privacy-violations.txt">009-privacy-violations.txt</a></p>
19941994
<p>Author:</p>
19951995
<ul>
19961996
<li><a href="mailto:[email protected]">[email protected]</a></li>

docs/desktop/addons/fuzzai-files/extract-training-data/index.html

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1864,7 +1864,7 @@ <h3 id="001-by-asking">001 By Asking <a class="header-link" href="#001-by-asking
18641864
<p>This file contains fuzzing payloads specific to <a href="https://osf.io/kb8a5/">AI-RMM Control &ldquo;Measure 2.7.2&rdquo;</a> The goal is to test if the system has established security and resilience metrics to detect potential theft of model training data, including encryption, access controls, and alarm thresholds for unauthorized access.</p>
18651865
<p>Payloads simulate scenarios where model training data security may be compromised.
18661866
Expected system behavior is detailed for each scenario.</p>
1867-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/001-by-asking.txt">001-by-asking.txt</a></p>
1867+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/001-by-asking.txt">001-by-asking.txt</a></p>
18681868
<p>Author:</p>
18691869
<ul>
18701870
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1878,7 +1878,7 @@ <h3 id="002-through-hypnosis">002 Through Hypnosis <a class="header-link" href="
18781878
<ul>
18791879
<li><a href="https://arxiv.org/pdf/2311.17035.pdf">Scalable Extraction of Training Data from (Production) Language Models</a></li>
18801880
</ul>
1881-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/002-through-hypnosis.txt">002-through-hypnosis.txt</a></p>
1881+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/002-through-hypnosis.txt">002-through-hypnosis.txt</a></p>
18821882
<p>Author:</p>
18831883
<ul>
18841884
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1898,7 +1898,7 @@ <h3 id="003-divergence-attack">003 Divergence Attack <a class="header-link" href
18981898
<ul>
18991899
<li><a href="https://arxiv.org/pdf/2311.17035.pdf">Scalable Extraction of Training Data from (Production) Language Models</a></li>
19001900
</ul>
1901-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/003-divergence-attack.txt">003-divergence-attack.txt</a></p>
1901+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/003-divergence-attack.txt">003-divergence-attack.txt</a></p>
19021902
<p>Author:</p>
19031903
<ul>
19041904
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1915,7 +1915,7 @@ <h3 id="004-sca">004 SCA <a class="header-link" href="#004-sca"><svg class="fill
19151915
<ul>
19161916
<li><a href="https://arxiv.org/pdf/2405.05990.pdf">Special Characters Attack: Toward Scalable Training Data Extraction from LLMs</a></li>
19171917
</ul>
1918-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/004-SCA.txt">004-SCA.txt</a></p>
1918+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/004-SCA.txt">004-SCA.txt</a></p>
19191919
<p>Author:</p>
19201920
<ul>
19211921
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1929,7 +1929,7 @@ <h3 id="005-the-secret-sharer">005 The Secret Sharer <a class="header-link" href
19291929
<ul>
19301930
<li><a href="https://arxiv.org/pdf/1802.08232v3.pdf">The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks</a></li>
19311931
</ul>
1932-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/005-the-secret-sharer.txt">005-the-secret-sharer.txt</a></p>
1932+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/005-the-secret-sharer.txt">005-the-secret-sharer.txt</a></p>
19331933
<p>Author:</p>
19341934
<ul>
19351935
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1942,7 +1942,7 @@ <h3 id="006-quantifying-memorization">006 Quantifying Memorization <a class="hea
19421942
<ul>
19431943
<li><a href="https://arxiv.org/pdf/2202.07646v3.pdf">Quantifying Memorization Across Neural Language Models</a></li>
19441944
</ul>
1945-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/006-quantifying-memorization.txt">006-quantifying-memorization.txt</a></p>
1945+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/006-quantifying-memorization.txt">006-quantifying-memorization.txt</a></p>
19461946
<p>Author:</p>
19471947
<ul>
19481948
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1958,7 +1958,7 @@ <h3 id="007-data-poisoning-attacks">007 Data Poisoning Attacks <a class="header-
19581958
<ul>
19591959
<li><a href="https://arxiv.org/pdf/2006.07709v1.pdf">Auditing Differentially Private Machine Learning: How Private is Private SGD?</a></li>
19601960
</ul>
1961-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/007-data-poisoning-attacks.txt">007-data-poisoning-attacks.txt</a></p>
1961+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/007-data-poisoning-attacks.txt">007-data-poisoning-attacks.txt</a></p>
19621962
<p>Author:</p>
19631963
<ul>
19641964
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1971,7 +1971,7 @@ <h3 id="008-membership-inference">008 Membership Inference <a class="header-link
19711971
<ul>
19721972
<li><a href="https://arxiv.org/pdf/2006.07709v1.pdf">Auditing Differentially Private Machine Learning: How Private is Private SGD?</a></li>
19731973
</ul>
1974-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/008-membership-inference.txt">008-membership-inference.txt</a></p>
1974+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/008-membership-inference.txt">008-membership-inference.txt</a></p>
19751975
<p>Author:</p>
19761976
<ul>
19771977
<li><a href="mailto:[email protected]">[email protected]</a></li>
@@ -1984,7 +1984,7 @@ <h3 id="009-gradient-clipping">009 Gradient Clipping <a class="header-link" href
19841984
<ul>
19851985
<li><a href="https://arxiv.org/pdf/2006.07709v1.pdf">Auditing Differentially Private Machine Learning: How Private is Private SGD?</a></li>
19861986
</ul>
1987-
<p>Fuzzing File: <a href="https://github.com/zaproxy/zap-extensions/blob/main/addOns/fuzzai/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/009-gradient-clipping.txt">009-gradient-clipping.txt</a></p>
1987+
<p>Fuzzing File: <a href="https://github.com/CyberRiskEngineering/zap-fuzzai-addon/tree/main/src/main/zapHomeFiles/fuzzers/fuzzai/AI/extract-training-data/009-gradient-clipping.txt">009-gradient-clipping.txt</a></p>
19881988
<p>Author:</p>
19891989
<ul>
19901990
<li><a href="mailto:[email protected]">[email protected]</a></li>

0 commit comments

Comments
 (0)