Instructions to use cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF with libraries, inference providers, notebooks, and local apps. Follow these links to get started.
- Libraries
- llama-cpp-python
How to use cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF with llama-cpp-python:
# !pip install llama-cpp-python from llama_cpp import Llama llm = Llama.from_pretrained( repo_id="cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF", filename="qwen-sast-f16.gguf", )
llm.create_chat_completion( messages = "No input example has been defined for this model task." )
- Notebooks
- Google Colab
- Kaggle
- Local Apps
- llama.cpp
How to use cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF with llama.cpp:
Install from brew
brew install llama.cpp # Start a local OpenAI-compatible server with a web UI: llama-server -hf cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16 # Run inference directly in the terminal: llama-cli -hf cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16
Install from WinGet (Windows)
winget install llama.cpp # Start a local OpenAI-compatible server with a web UI: llama-server -hf cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16 # Run inference directly in the terminal: llama-cli -hf cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16
Use pre-built binary
# Download pre-built binary from: # https://github.com/ggerganov/llama.cpp/releases # Start a local OpenAI-compatible server with a web UI: ./llama-server -hf cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16 # Run inference directly in the terminal: ./llama-cli -hf cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16
Build from source code
git clone https://github.com/ggerganov/llama.cpp.git cd llama.cpp cmake -B build cmake --build build -j --target llama-server llama-cli # Start a local OpenAI-compatible server with a web UI: ./build/bin/llama-server -hf cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16 # Run inference directly in the terminal: ./build/bin/llama-cli -hf cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16
Use Docker
docker model run hf.co/cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16
- LM Studio
- Jan
- Ollama
How to use cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF with Ollama:
ollama run hf.co/cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16
- Unsloth Studio new
How to use cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF with Unsloth Studio:
Install Unsloth Studio (macOS, Linux, WSL)
curl -fsSL https://unsloth.ai/install.sh | sh # Run unsloth studio unsloth studio -H 0.0.0.0 -p 8888 # Then open http://localhost:8888 in your browser # Search for cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF to start chatting
Install Unsloth Studio (Windows)
irm https://unsloth.ai/install.ps1 | iex # Run unsloth studio unsloth studio -H 0.0.0.0 -p 8888 # Then open http://localhost:8888 in your browser # Search for cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF to start chatting
Using HuggingFace Spaces for Unsloth
# No setup required # Open https://huggingface.co/spaces/unsloth/studio in your browser # Search for cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF to start chatting
- Pi new
How to use cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF with Pi:
Start the llama.cpp server
# Install llama.cpp: brew install llama.cpp # Start a local OpenAI-compatible server: llama-server -hf cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16
Configure the model in Pi
# Install Pi: npm install -g @mariozechner/pi-coding-agent # Add to ~/.pi/agent/models.json: { "providers": { "llama-cpp": { "baseUrl": "http://localhost:8080/v1", "api": "openai-completions", "apiKey": "none", "models": [ { "id": "cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16" } ] } } }Run Pi
# Start Pi in your project directory: pi
- Hermes Agent new
How to use cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF with Hermes Agent:
Start the llama.cpp server
# Install llama.cpp: brew install llama.cpp # Start a local OpenAI-compatible server: llama-server -hf cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16
Configure Hermes
# Install Hermes: curl -fsSL https://hermes-agent.nousresearch.com/install.sh | bash hermes setup # Point Hermes at the local server: hermes config set model.provider custom hermes config set model.base_url http://127.0.0.1:8080/v1 hermes config set model.default cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16
Run Hermes
hermes
- Docker Model Runner
How to use cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF with Docker Model Runner:
docker model run hf.co/cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16
- Lemonade
How to use cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF with Lemonade:
Pull the model
# Download Lemonade from https://lemonade-server.ai/ lemonade pull cmonplz/Qwen-3B-SAST-Python-Remediation-GGUF:F16
Run and chat with the model
lemonade run user.Qwen-3B-SAST-Python-Remediation-GGUF-F16
List all available models
lemonade list
Qwen-3B-SAST-Python-Remediation-GGUF
This is a fine-tuned version of Qwen/Qwen2.5-3B-Instruct, specialized for suggesting fixes to Python security vulnerabilities found by Static Analysis Security Testing (SAST) tools.
It takes a vulnerability description and a snippet of Python code as input and suggests a high-quality, secure fix. The model was fine-tuned on a custom, high-quality dataset of Python SAST issues.
How to Use It
This model is in GGUF format and is designed to be used with llama.cpp.
Command-Line Inference with llama-cli
- Download the desired GGUF file from the "Files and versions" tab. The
q4_k_mversion is recommended for the best balance of quality and performance. - Run the model using
llama-cliwith the--chatmlprompt format. This is critical for good performance.
# Run the command-line interface with your model
.\build\bin\Release\llama-cli.exe -m model\path\qwen-sast-q4_k_m.gguf --chatml -n 256 -p "Fix the security vulnerability in this code ### Input: def bad_code(): ..."
Model Details
- Base Model: Qwen/Qwen2.5-3B-Instruct
- Fine-tuning: The model was fine-tuned using QLoRA for 3 epochs.
- Dataset: The model was trained on a private, high-quality dataset of Python code vulnerabilities and their corresponding remediations.
Intended Use
This model is intended for security researchers, developers, and DevOps engineers to accelerate the process of fixing common Python security vulnerabilities. It can be used as an assistive tool to suggest fixes that can then be reviewed by a human.
Limitations and Bias
- Language: The model is specialized for Python only and will not perform well on other programming languages.
- Accuracy: While the model produces high-quality fixes, it can still make mistakes or "hallucinate." All suggested code remediations must be carefully reviewed by a human expert before being implemented in production.
- Scope: The model was trained on a specific set of vulnerability types. It may not be effective for highly complex or esoteric security issues.
Local Performance Versus Base
~12% speed boost per fix with local inference on CPU. Fix quality is what really stands out.
# base qwen:
======================================================================
REMEDIATION SUMMARY
======================================================================
Total vulnerabilities: 35
Successfully remediated: 35
Failed: 0
By confidence:
High: 35
Processing time: 803.30s
Average: 22.95s per vulnerability
Results saved to: fixes.json
# fine tuned:
======================================================================
REMEDIATION SUMMARY
======================================================================
Total vulnerabilities: 35
Successfully remediated: 35
Failed: 0
By confidence:
High: 35
Processing time: 710.80s
Average: 20.31s per vulnerability
Results saved to: fixes.json
- Downloads last month
- 3
4-bit
16-bit