179 1 week ago

Fine-tune of Gemma 4 E4B (4B parameters) specialized in offensive and defensive cybersecurity. Trained with LoRA (r=16) on a dataset covering vulnerability analysis, secure code review, and Java insecure code remediation.

tools thinking
ollama run luisppb16/gemma4-e4b-SecOps

Details

1 week ago

f6f7c9d6cc4d · 5.3GB ·

gemma4
·
7.52B
·
Q4_K_M
Eres un experto en ciberseguridad con más de 15 años de experiencia en seguridad ofensiva y defens
{ "num_ctx": 131072, "num_predict": 4096, "repeat_last_n": 256, "repeat_penalty": 1.

Readme

gemma4-e4b-SecOps

Fine-tuned cybersecurity expert based on Gemma 4 E4B — specialized in offensive and defensive security analysis.

Overview

gemma4-e4b-SecOps is a fine-tuned version of Google’s Gemma 4 E4B (4B parameters) trained with LoRA on a curated dataset of real-world security vulnerabilities, secure code review, and insecure code remediation.

It responds as a senior cybersecurity expert, covering both offensive and defensive security domains.

Capabilities

  • 🔍 Vulnerability Analysis — Identifies and explains security flaws in code (SQL Injection, Path Traversal, XSS, IDOR, etc.)
  • 🛡️ Secure Code Review — Reviews code and provides hardened, production-ready alternatives
  • ⚠️ Threat Classification — Classifies threats by severity (Critical / High / Medium / Low) using CVSS scoring
  • 📋 Compliance Guidance — References OWASP Top 10, NIST, ISO 27001, GDPR, ENS
  • 🔧 DevSecOps — Secure SDLC, container security, cloud security (AWS, Azure, GCP)
  • 🕵️ Malware & Forensics — Digital forensics and malware analysis guidance

Response Format

Every response follows a structured expert format:

  1. 🔍 Analysis — What is happening and why it matters
  2. ⚠️ Risks — Potential impact classified by severity with CVE/CVSS when applicable
  3. Recommendations — Concrete, prioritized mitigation steps with corrected code
  4. 📚 References — CVE, OWASP, NIST, CWE and other authoritative sources

Usage

ollama run luisppb16/gemma4-e4b-SecOps

Example prompt

Analyze this Java code and identify all security vulnerabilities:

public String getUser(String id) {
    String query = "SELECT * FROM users WHERE id=" + id;
    return db.execute(query);
}

Model Details

Property Value
Base model unsloth/gemma-4-e4b-it
Parameters 4B
Quantization Q4_K_M
Fine-tuning method LoRA (r=16, alpha=16)
Context window 128K tokens
Framework Unsloth + TRL
Language Spanish / English

Expertise Areas

Domain Coverage
Web Application Security OWASP Top 10, SQL Injection, XSS, CSRF, Path Traversal
Java Secure Coding PreparedStatement, input validation, secrets management
Infrastructure Security Networks, containers, cloud (AWS/Azure/GCP)
Compliance ISO 27001, NIST CSF, GDPR, ENS
Offensive Security Pentesting methodology, OSCP/CEH techniques
Forensics & Malware Incident response, malware analysis

License

Based on Gemma — subject to Google’s Gemma Terms of Use.