Co1lin / CWEvalLinks
Simultaneous evaluation on both functionality and security of LLM-generated code.
☆31Updated last month
Alternatives and similar repositories for CWEval
Users that are interested in CWEval are comparing it to the libraries listed below
Sorting:
- ☆50Updated last year
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Updated 9 months ago
- ☆86Updated 4 months ago
- ☆21Updated last year
- enchmarking Large Language Models' Resistance to Malicious Code☆13Updated last year
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆63Updated 2 months ago
- Adversarial Attack for Pre-trained Code Models☆10Updated 3 years ago
- Backdooring Neural Code Search☆14Updated 2 years ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆223Updated 2 months ago
- [TOSEM 2023] A Survey of Learning-based Automated Program Repair☆74Updated last year
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆26Updated last year
- A Systematic Literature Review on Large Language Models for Automated Program Repair☆222Updated last week
- ☆126Updated last year
- [CIKM 2024] Trojan Activation Attack: Attack Large Language Models using Activation Steering for Safety-Alignment.☆29Updated last year
- ☆119Updated 11 months ago
- Automated Benchmarking of LLM Agents on Real-World Software Security Tasks [NeurIPS 2025]☆50Updated last month
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆56Updated 9 months ago
- ☆37Updated last year
- Code for ACL (main) paper "JumpCoder: Go Beyond Autoregressive Coder via Online Modification"☆27Updated last year
- An Evolving Code Generation Benchmark Aligned with Real-world Code Repositories☆67Updated last year
- Enhacing Code Pre-trained Models by Contrastive Learning☆38Updated 2 years ago
- [2023 TDSC] Pre-trained Model-based Automated Software Vulnerability Repair: How Far are We?☆25Updated 2 years ago
- ☆12Updated 3 weeks ago
- ☆37Updated last year
- [ACL2024-Main] Data and Code for WaterBench: Towards Holistic Evaluation of LLM Watermarks☆30Updated 2 years ago
- ☆55Updated last year
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆187Updated 9 months ago
- [ICLR 2024] The official implementation of our ICLR2024 paper "AutoDAN: Generating Stealthy Jailbreak Prompts on Aligned Large Language M…☆421Updated 11 months ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆34Updated 2 years ago
- [CCS 2024] Optimization-based Prompt Injection Attack to LLM-as-a-Judge☆39Updated 4 months ago