VaultChem commited on
Commit
a072763
β€’
1 Parent(s): a651d7e
Files changed (1) hide show
  1. app.py +5 -2
app.py CHANGED
@@ -326,14 +326,17 @@ if __name__ == "__main__":
326
  gr.Markdown("# πŸ“€ Step 2: Upload a file for scanning")
327
  gr.Markdown("## Client side")
328
  gr.Markdown(
329
- "Upload a file you want to scan for malware. ClairVault will encrypt it locally before sending it to the cloud."
 
 
 
330
  )
331
  file_input = gr.File(label="Upload a harmless exe file or use default:", file_count = "single", value="./harmless.exe")
332
 
333
  gr.Markdown("# πŸ“₯ Step 3: Extract executable file features")
334
 
335
  b_extract = gr.Button("πŸ“₯ Extract features from harmless file and save")
336
- c_extract = gr.Button("Load features from malware file and save")
337
 
338
  extracted_vector = gr.JSON(
339
  label="Extracted vector:",
 
326
  gr.Markdown("# πŸ“€ Step 2: Upload a file for scanning")
327
  gr.Markdown("## Client side")
328
  gr.Markdown(
329
+ "Upload a file you want to scan for malware. In reality the file first be processed locally, the result encrypted it before sending it to the cloud."
330
+ )
331
+ gr.Markdown(
332
+ "The default file is a harmless executable. You may delete it to upload your own exe file. IF you want to run this app on actual malware, please do not do that! Instead, skip this step and select the second option in the next step. We have extracted feature vectors from real hardware for you so it is safe to run the analysis here!"
333
  )
334
  file_input = gr.File(label="Upload a harmless exe file or use default:", file_count = "single", value="./harmless.exe")
335
 
336
  gr.Markdown("# πŸ“₯ Step 3: Extract executable file features")
337
 
338
  b_extract = gr.Button("πŸ“₯ Extract features from harmless file and save")
339
+ c_extract = gr.Button("πŸ“₯ Load features from malware file and save")
340
 
341
  extracted_vector = gr.JSON(
342
  label="Extracted vector:",