OWASP / www-project-llm-verification-standard
Project LLM Verification Standard
☆41Updated 11 months ago
Alternatives and similar repositories for www-project-llm-verification-standard:
Users that are interested in www-project-llm-verification-standard are comparing it to the libraries listed below
- OWASP Machine Learning Security Top 10 Project☆83Updated 2 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆72Updated last month
- Payloads for Attacking Large Language Models☆77Updated 8 months ago
- ATLAS tactics, techniques, and case studies data☆60Updated 2 weeks ago
- ☆30Updated last month
- LLM Testing Findings Templates☆70Updated last year
- AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications …☆27Updated 3 months ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated 10 months ago
- ☆36Updated 3 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆62Updated 2 weeks ago
- source code for the offsecml framework☆38Updated 9 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 9 months ago
- A benchmark for prompt injection detection systems.☆98Updated last month
- ☆37Updated 3 months ago
- Top 10 for Agentic AI (AI Agent Security) - Pre-release version☆72Updated 3 weeks ago
- Dropbox LLM Security research code and results☆221Updated 10 months ago
- ☆27Updated 2 months ago
- OWASP Foundation Web Respository☆246Updated this week
- source for llmsec.net☆15Updated 8 months ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆34Updated last month
- A collection of prompt injection mitigation techniques.☆20Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆160Updated last year
- A security-first linter for code that shouldn't need linting☆16Updated last year
- ☆203Updated last year
- An example vulnerable app that integrates an LLM☆15Updated 11 months ago
- Explore AI Supply Chain Risk with the AI Risk Database☆53Updated 10 months ago
- ☆21Updated last year
- A LLM explicitly designed for getting hacked☆139Updated last year
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆108Updated last year