{"id":"https://openalex.org/W7118762978","doi":"https://doi.org/10.48550/arxiv.2601.01320","title":"Adaptive Hierarchical Evaluation of LLMs and SAST tools for CWE Prediction in Python","display_name":"Adaptive Hierarchical Evaluation of LLMs and SAST tools for CWE Prediction in Python","publication_year":2026,"publication_date":"2026-01-04","ids":{"openalex":"https://openalex.org/W7118762978","doi":"https://doi.org/10.48550/arxiv.2601.01320"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.01320","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01320","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.01320","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109779945","display_name":"Muntasir Adnan","orcid":"https://orcid.org/0009-0002-6345-9364"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Adnan, Muntasir","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5122076134","display_name":"Carlos C. N. Kuhn","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kuhn, Carlos C. N.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109779945"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.37599998712539673,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.37599998712539673,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.18230000138282776,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.07209999859333038,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.7688000202178955},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.4943000078201294},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4796000123023987},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4172999858856201},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.3093999922275543},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.3021000027656555}],"concepts":[{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.7688000202178955},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5935999751091003},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5393000245094299},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.4943000078201294},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4796000123023987},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42899999022483826},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4172999858856201},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3174999952316284},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.3093999922275543},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.3021000027656555},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.29589998722076416},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.2685999870300293},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.265500009059906},{"id":"https://openalex.org/C66024118","wikidata":"https://www.wikidata.org/wiki/Q1122506","display_name":"Computational model","level":2,"score":0.2551000118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.01320","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01320","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.01320","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01320","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Large":[0],"Language":[1],"Models":[2],"have":[3],"become":[4],"integral":[5],"to":[6],"software":[7],"development,":[8],"yet":[9],"they":[10],"frequently":[11],"generate":[12],"vulnerable":[13],"code.":[14],"Existing":[15],"code":[16],"vulnerability":[17,131],"detection":[18,132],"benchmarks":[19],"employ":[20],"binary":[21],"classification,":[22],"lacking":[23],"the":[24,45],"CWE-level":[25],"specificity":[26],"required":[27],"for":[28,109,117],"actionable":[29],"feedback":[30],"in":[31,42,73],"iterative":[32],"correction":[33],"systems.":[34,111],"We":[35,112],"present":[36],"ALPHA":[37,62,121],"(Adaptive":[38],"Learning":[39],"via":[40],"Penalty":[41],"Hierarchical":[43],"Assessment),":[44],"first":[46],"function-level":[47],"Python":[48],"benchmark":[49],"that":[50],"evaluates":[51],"both":[52],"LLMs":[53,78,85],"and":[54,67,79],"SAST":[55,81,90],"tools":[56],"using":[57],"hierarchically":[58],"aware,":[59],"CWE-specific":[60],"penalties.":[61],"distinguishes":[63],"between":[64],"over-generalisation,":[65],"over-specification,":[66],"lateral":[68],"errors,":[69],"reflecting":[70],"practical":[71],"differences":[72],"diagnostic":[74],"utility.":[75],"Evaluating":[76],"seven":[77],"two":[80],"tools,":[82],"we":[83],"find":[84],"substantially":[86],"outperform":[87],"SAST,":[88],"though":[89],"demonstrates":[91],"higher":[92],"precision":[93],"when":[94],"detections":[95],"occur.":[96],"Critically,":[97],"prediction":[98],"consistency":[99],"varies":[100],"dramatically":[101],"across":[102],"models":[103],"(8.26%-81.87%":[104],"agreement),":[105],"with":[106],"significant":[107],"implications":[108],"feedback-driven":[110],"further":[113],"outline":[114],"a":[115],"pathway":[116],"future":[118],"work":[119],"incorporating":[120],"penalties":[122],"into":[123],"supervised":[124],"fine-tuning,":[125],"which":[126],"could":[127],"provide":[128],"principled":[129],"hierarchy-aware":[130],"pending":[133],"empirical":[134],"validation.":[135]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
