A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)
☆96Jan 20, 2025Updated last year
Alternatives and similar repositories for awesome-llm-supply-chain-security
Users that are interested in awesome-llm-supply-chain-security are comparing it to the libraries listed below
Sorting:
- TensorFlow API analysis tool and malicious model detection tool☆39May 27, 2025Updated 9 months ago
- ☆14Mar 9, 2025Updated last year
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆27Sep 11, 2024Updated last year
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated last year
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆13Jan 31, 2024Updated 2 years ago
- ☆32May 1, 2025Updated 10 months ago
- ☆11Nov 7, 2025Updated 4 months ago
- A containerized Model Context Protocol (MCP) server providing static code analysis using Joern's Code Property Graph (CPG) with support f…☆46Feb 21, 2026Updated 2 weeks ago
- An overview of LLMs for cybersecurity.☆1,239Feb 9, 2026Updated last month
- Using SVF in Python Projects☆15Updated this week
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆21Mar 7, 2025Updated last year
- aurora-d☆20Apr 24, 2022Updated 3 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Awesome LLM for Cybersecurity☆11Nov 16, 2024Updated last year
- Codebase for Obfuscated Activations Bypass LLM Latent-Space Defenses☆29Feb 11, 2025Updated last year
- A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654☆39Apr 21, 2024Updated last year
- ☆29Aug 31, 2025Updated 6 months ago
- a secret detection tool☆39Mar 1, 2026Updated last week
- ☆13Jun 15, 2024Updated last year
- Code for our 2024 ACM AsiaCCS Paper "Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact"☆17Dec 19, 2025Updated 2 months ago
- A research workbench for developing and testing attacks against large language models, with a focus on prompt injection vulnerabilities a…☆43Updated this week
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆12May 14, 2024Updated last year
- A continuously updated collection of CodeLLM papers maintained by PurCL group @ Purdue☆606Jan 14, 2026Updated last month
- The source code of project "LLift" (Enhancing static analysis with LLM)☆85Mar 5, 2024Updated 2 years ago
- An autonomous LLM-agent for large-scale, repository-level code auditing☆345Dec 4, 2025Updated 3 months ago
- ☆11Nov 1, 2023Updated 2 years ago
- Testability Pattern Catalogs for SAST☆32Feb 18, 2025Updated last year
- ☆206Oct 27, 2025Updated 4 months ago
- [NeurIPS 2024 / ICML 2025] LLM Quantization Attacks☆48Jan 15, 2026Updated last month
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Jul 24, 2025Updated 7 months ago
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆18Sep 1, 2025Updated 6 months ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆15Feb 12, 2025Updated last year
- Fuzzing Coreutils with AFL on kubernetes☆13Apr 25, 2019Updated 6 years ago
- Academic Papers about LLM Application on Security☆207Jun 30, 2025Updated 8 months ago
- Framework for building reliable LLM agents with structured specs, operator-level verification, and progressive solidification.☆61Feb 27, 2026Updated last week