# Framework

AVID stores instantiations of AI risks---categorized using the AVID taxonomy---using two base data classes: [Report](/database/framework/auxiliary-classes.md) and [Vulnerability](/database/framework/base-classes.md). A *report* is one example of a particular vulnerability occurring, supported by qualitative or quantitative evaluation. A *vulnerability* (vuln) is a high-level evidence of an AI failure mode, similar to the NIST CVEs in the context of software vulnerabilities.

As an example, the vuln [AVID-2022-V001](https://github.com/avidml/avid-db/blob/main/vulnerabilities/2022/AVID-2022-V001.json) is about gender bias in the large language model `bert-base-uncased`. This bias is measured through multiple reports, [AVID-2022-R0001](https://github.com/avidml/avid-db/blob/main/reports/2022/AVID-2022-R0001.json) and [AVID-2022-R0002](https://github.com/avidml/avid-db/blob/main/reports/2022/AVID-2022-R0002.json), which measure gender bias in two separate contexts, using different metrics and datasets, and record salient information and references on those measurements.

The above formulation is similar to how incidents and incident reports are structured in the [AI Incident Database](https://incidentdatabase.ai/). See Figure D.1 for a schematic representation of this structure.

<figure><img src="https://lh6.googleusercontent.com/Y17s_ikGkr0Lmd5pbO998jXmfHpGBdDqzilJ34qSk4nRy6RG1vfV1jt0xN2efmoROpvaVrzRv74l8ke6pK4SwGZfgXUvIxo40fOxbMdzS7fHj_2MAGs8xO6WgY20YJ_rOoI9FvMxlqRkYtu0kmIFh78" alt="" width="563"><figcaption><p><strong>Figure D.1.</strong> Schematic of the structure of the AVID taxonomy, vulns, and reports.</p></figcaption></figure>

To account for diverse levels of details that different groups of AI risk examples can entail, we designate a class for each vulnerability and report. Each such vuln/report class extends the respective base class to a slightly different structure that enables storage of information at different granularities as required. For example, we currently support four vuln/report classes: evaluations of large language models (`LLM Evaluation`), incidents from AIID (`AIID Incident`), vulnerabilities from CVE (`CVE Entry`), and externally sourced reports (`Third-party Report`). These classes share the same core vuln/report field structure, with slight differences in values filled under references and tags.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.avidml.org/database/framework.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
