Comcast / ProjectGuardRail
AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications should meet during their design phase that serve as guardrails against these threats. These requirements help scope the threats such applications must be protected against.
☆29Updated 4 months ago
Alternatives and similar repositories for ProjectGuardRail
Users that are interested in ProjectGuardRail are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆31Updated 2 years ago
- ☆41Updated 2 months ago
- LLM Testing Findings Templates☆72Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- AI featured threat modeling and security review project☆16Updated 5 months ago
- ☆33Updated 3 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated last week
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆28Updated 3 months ago
- Threat Modeling Manifesto☆28Updated 9 months ago
- ☆10Updated 3 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆64Updated 10 months ago
- ☆36Updated 4 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆96Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 2 months ago
- InfoSec OpenAI Examples☆19Updated last year
- Systematic Universal Security Testing Orchestration☆37Updated 3 years ago
- AI featured threat modeling and security review action☆43Updated 5 months ago
- Core model including reused documentation☆98Updated last month
- Secure Jupyter Notebooks and Experimentation Environment☆74Updated 3 months ago
- A project to visualize the software supply chain☆50Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆35Updated 2 months ago
- ☆21Updated 3 weeks ago
- ☆39Updated 5 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- ☆104Updated 11 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated 3 weeks ago
- ☆87Updated 3 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated this week