An autonomous LLM-agent for large-scale, repository-level code auditing
☆356Mar 12, 2026Updated last week
Alternatives and similar repositories for RepoAudit
Users that are interested in RepoAudit are comparing it to the libraries listed below
Sorting:
- Parsing-based Analyzer☆72Jun 8, 2025Updated 9 months ago
- LLMDFA: Analyzing Dataflow in Code with Large Language Models (NeurIPS 2024)☆202Oct 24, 2025Updated 4 months ago
- A continuously updated collection of CodeLLM papers maintained by PurCL group @ Purdue☆612Jan 14, 2026Updated 2 months ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆28Feb 21, 2024Updated 2 years ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Feb 26, 2026Updated 3 weeks ago
- ☆36Nov 13, 2025Updated 4 months ago
- LLMSAN: Sanitizing Large Language Models in Bug Detection with Data-Flow (EMNLP Findings 2024)☆84Oct 24, 2025Updated 4 months ago
- ☆17Sep 4, 2024Updated last year
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆21Oct 5, 2025Updated 5 months ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- Lifting network implementation to precise format specification☆23Apr 21, 2025Updated 10 months ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- Official Implementation of NeurIPS 2024 paper - BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens☆28Feb 17, 2026Updated last month
- The source code of project "LLift" (Enhancing static analysis with LLM)☆85Mar 5, 2024Updated 2 years ago
- Awesome Large Language Models for Vulnerability Detection☆398Updated this week
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆53Jun 2, 2025Updated 9 months ago
- ☆11Sep 6, 2024Updated last year
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆18Mar 10, 2025Updated last year
- ☆15Dec 29, 2023Updated 2 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Oct 21, 2023Updated 2 years ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆70Aug 14, 2025Updated 7 months ago
- ☆18Aug 15, 2022Updated 3 years ago
- A neurosymbolic framework for vulnerability detection in code☆336Dec 5, 2025Updated 3 months ago
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Mar 28, 2024Updated last year
- ☆20Feb 11, 2024Updated 2 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- Source code for LLMxCPG paper☆125Feb 10, 2026Updated last month
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆96Jan 20, 2025Updated last year
- Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts☆22May 11, 2024Updated last year
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Dec 31, 2024Updated last year
- CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities☆178Jan 14, 2026Updated 2 months ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- 🔮Reasoning for Safer Code Generation; 🥇Winner Solution of Amazon Nova AI Challenge 2025☆36Aug 24, 2025Updated 6 months ago
- A simple Joern MCP Server.☆37Nov 14, 2025Updated 4 months ago
- Machine Learning & Security Seminar @Purdue University☆25May 9, 2023Updated 2 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 6 months ago
- YASA is an open-source static program analysis project. Its core innovation lies in a unified intermediate representation called UAST, d…☆255Mar 5, 2026Updated 2 weeks ago
- A very simple open source implementation of Google's Project Naptime☆182Mar 27, 2025Updated 11 months ago
- Cottontail: A LLM-Driven Concolic Execution Engine (Accepted by IEEE S&P'26)☆38Dec 4, 2025Updated 3 months ago