training vulnerabilties
Query use case
Are their any known vulnerabilities on the training code software that was used?
Schemas used
Pseudo code
FUNCTION ai_system_training_software_vulnerabilities(AI_System_ID)
CREATE empty list Vulnerabilities
// Step 1: Retrieve the Config ID from the AI system's data
SET Config_ID = get configuration ID from AI_System_ID
// Step 2: Use the Config ID to find the training system's ID
SET Training_System_ID = get training AI system linked to Config_ID
// Step 3: Retrieve the Code ID from the training AI system
SET Code_ID = get code ID from Training_System_ID
// Step 4: Retrieve the SBOM ID from the code record
SET SBOM_ID = get SBOM ID from Code_ID
// Step 5: Find all vulnerability attestations linked to this SBOM
FOR EACH Attestation in database DO
IF Attestation is linked to component(_, SBOM_ID) AND
Attestation is of type vulnerability_attestation THEN
ADD Attestation TO Vulnerabilities
// Step 6: Return the list of vulnerabilities
RETURN Vulnerabilities
END FUNCTION
Explanation
-
Extract Configuration from AI System:
- The function begins by retrieving the configuration identifier (
Config_ID
) from the specified AI system's training data.
- The function begins by retrieving the configuration identifier (
-
Identify Training AI System:
- Using the
Config_ID
, the function finds the associated training AI system. This is the system used to generate the model or perform training.
- Using the
-
Retrieve Code Identifier of Training System:
- It then extracts the
Code_ID
associated with the training AI system, which contains software-related metadata.
- It then extracts the
-
Fetch SBOM Identifier:
- The Software Bill of Materials (SBOM) identifier is retrieved from the code record of the training system.
-
Find Matching Vulnerability Attestations:
- The function searches for attestations that reference the extracted SBOM component and are of the type
vulnerability_attestation
.
- The function searches for attestations that reference the extracted SBOM component and are of the type
-
Return the Results:
- All valid vulnerability attestations related to the training system’s software are compiled and returned.
Query
db:ai_system_training_software_vulnerabilities(AiSystemId, Vulnerabilities)
link to query- link to simulator