Understand the evaluation process and write your own
analyze_file
where the model is provided a single file and asked to return a list of vulnerabilities, or even a binary classification of “does this file contain vulnerabilities?”.
Don’t be afraid to adjust the scope of your tasks and stitch them together into more complex workflows. For example: