... | @@ -97,7 +97,7 @@ Hence, the following HTTP GET Request needs to be submitted: |
... | @@ -97,7 +97,7 @@ Hence, the following HTTP GET Request needs to be submitted: |
|
After submitting the request, the *Vulnerability Prediction* service is invoked and the selected project is analyzed. In brief, the service selects the Deep Learning Model for the specified programming language, and performs text mining in order to produce vectors with sequences of embedded tokens (i.e., words) for each one of the source code files of the project. Subsequently, these vectors are passed as input to the selected Deep Learning Model, which computes the likelihood of vulnerability and classifies the corresponding file as potentially vulnerble or clean/neutral. After the successful execution of the analysis, a JSON report with the results is produced and sent as a response to the user. The produced JSON for the *HelloWorldCompiled* project is presented below:
|
|
After submitting the request, the *Vulnerability Prediction* service is invoked and the selected project is analyzed. In brief, the service selects the Deep Learning Model for the specified programming language, and performs text mining in order to produce vectors with sequences of embedded tokens (i.e., words) for each one of the source code files of the project. Subsequently, these vectors are passed as input to the selected Deep Learning Model, which computes the likelihood of vulnerability and classifies the corresponding file as potentially vulnerable or clean/neutral. After the successful execution of the analysis, a JSON report with the results is produced and sent as a response to the user. The produced JSON for the *HelloWorldCompiled* project is presented below:
|