NVIDIA-AI-Blueprints / vulnerability-analysis
Rapidly identify and mitigate container security vulnerabilities with generative AI.
☆111Updated this week
Alternatives and similar repositories for vulnerability-analysis:
Users that are interested in vulnerability-analysis are comparing it to the libraries listed below
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆25Updated 3 months ago
- ☆34Updated 2 months ago
- Top 10 for Agentic AI (AI Agent Security) - Pre-release version☆84Updated last month
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆72Updated last week
- A plugin-based gateway that orchestrates other MCPs and allows developers to build upon it enterprise-grade agents.☆106Updated this week
- Secure Jupyter Notebooks and Experimentation Environment☆74Updated 2 months ago
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆75Updated 6 months ago
- A security scanner for your LLM agentic workflows☆442Updated this week
- ☆36Updated 3 months ago
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆51Updated 2 months ago
- OWASP Foundation Web Respository☆250Updated last week
- A Python-based tool that monitors dark web sources for mentions of specific organizations for Threat Monitoring.☆15Updated 2 weeks ago
- Repository for on-going work as part of the AIBOM Tiger Team effort.☆20Updated 7 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆107Updated 6 months ago
- Zero Trust Agent☆17Updated 3 weeks ago
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆67Updated 4 months ago
- Security and compliance proxy for LLM APIs☆46Updated last year
- This repository is for administrative documents for the CoSAI OASIS Open Project☆50Updated last week
- Test Software for the Characterization of AI Technologies☆246Updated last week
- Code snippets to reproduce MCP tool poisoning attacks.☆93Updated 2 weeks ago
- Agentic Workflows Made Simple☆137Updated last month
- ATLAS tactics, techniques, and case studies data☆63Updated last month
- Dropbox LLM Security research code and results☆222Updated 11 months ago
- A MCP server for using Semgrep to scan code for security vulnerabilities.☆127Updated 2 weeks ago
- A fun POC that is built to understand AI security agents.☆30Updated 4 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆46Updated last year
- ☆34Updated 2 months ago
- A tool for preventing the installation of malicious PyPI and npm packages☆134Updated this week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- ☆21Updated 3 weeks ago