Post-Training Model Vulnerability & Backdoor Detection
docker compose -f docker/docker-compose.yml up --build
# Default input: ./examples/input
# Output: ./out/output.json./scripts/run_local.sh --input-dir ./examples/input --output ./out/output.jsonsrc/: implementation codetests/: testsdocs/: documentationexamples/: example input directories/output samplesdocker/: Docker runtime configurationscripts/: local run/validation/smoke tests
- Spec document:
docs/input-output-spec.md - Example input dir:
examples/input/ - Input structure guide:
examples/input/README.md - Example output:
examples/expected_output.json
examples/input/
metadata.json
artifacts/ # optional
{
"model_source": {
"type": "<MODEL_SOURCE_TYPE>",
"repo_id": "<MODEL_REPO_ID>"
},
"options": {
"include_layers": true,
"include_dependencies": true
}
}docker compose -f docker/docker-compose.yml up --buildCustom input directory:
INPUT_PATH=/app/examples/<CUSTOM_INPUT_DIR> OUTPUT_PATH=/app/out/<CUSTOM_OUTPUT>.json \
docker compose -f docker/docker-compose.yml up --buildOption: Compose example for directly mounting host directories
HOST_INPUT_DIR="<INPUT_DIRECTORY_PATH>" HOST_OUTPUT_DIR="<OUTPUT_DIRECTORY_PATH>" \
docker compose -f docker/docker-compose.host-path.yml up --buildDirect docker run example (host path mount):
docker run --rm \
-v "$INPUT_DIR:/data/in" \
-v "$OUTPUT_DIR:/data/out" \
<IMAGE_NAME>:latest /bin/bash /<ENTRYPOINT_SCRIPT>.sh <TARGET_NAME>Example:
INPUT_DIR="<INPUT_DIRECTORY_PATH>"
OUTPUT_DIR="<OUTPUT_DIRECTORY_PATH>"
docker run --rm \
-v "$INPUT_DIR:/data/in" \
-v "$OUTPUT_DIR:/data/out" \
ddinfer:latest /bin/bash /ddinfer.sh bluez-5.55./scripts/run_local.sh --input-dir ./examples/input --output ./out/output.json./scripts/smoke_test.sh./scripts/validate_schema.sh ./out/output.json- Getting started:
docs/getting-started.md - I/O spec:
docs/input-output-spec.md - Tool inputs:
docs/tool-inputs.md - Examples:
docs/examples.md - Troubleshooting:
docs/troubleshooting.md(optional) - FAQ:
docs/faq.md(optional)