Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances before risking being detected.
Main Code: 4,170 LOC (61 files) = PY (97%) + YML (2%) Secondary code: Test: 12 LOC (1); Generated: 0 LOC (0); Build & Deploy: 92 LOC (6); Other: 140 LOC (3); |
|||
Duplication: 21% | |||
File Size: 0% long (>1000 LOC), 93% short (<= 200 LOC) | |||
Unit Size: 11% long (>100 LOC), 49% short (<= 10 LOC) | |||
Conditional Complexity: 0% complex (McCabe index > 50), 65% simple (McCabe index <= 5) | |||
|
Logical Component Decomposition: primary (13 components) | ||
Goals: Keep the system simple and easy to change (4) | |||
Features of interest:
TODOs
4 files |
generated by sokrates.dev (configuration) on 2022-01-25