The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As traditional software security practices are not always sufficient for AI, this project provides a shared understanding and a common language for addressing the unique security challenges of the AI development lifecyc…
☆60Feb 19, 2026Updated 2 weeks ago
Alternatives and similar repositories for secure-ai-tooling
Users that are interested in secure-ai-tooling are comparing it to the libraries listed below
Sorting:
- Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems☆43Sep 29, 2025Updated 5 months ago
- This repository is for administrative documents for the CoSAI OASIS Open Project☆74Feb 25, 2026Updated last week
- Repository for CoSAI workstream 3, AI Risk Governance☆23Feb 18, 2026Updated 2 weeks ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- Repository for CoSAI workstream 2, Preparing Defenders for a Changing Cybersecurity Landscape☆48Dec 2, 2025Updated 3 months ago
- MCP Server Security Standard (MSSS): an open, testable security control standard for certifying MCP servers, with levels, evidence requir…☆62Jan 29, 2026Updated last month
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆18Sep 1, 2024Updated last year
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆90Updated this week
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- KEV EPSS Data☆31Updated this week
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- A toolkit for optimizing machine learning models for practical applications☆31Mar 6, 2025Updated last year
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & tra…☆23Jan 3, 2026Updated 2 months ago
- For Implementing CIS Controls in Different Operating Systems☆13Aug 2, 2019Updated 6 years ago
- AIM - The open-source NHI platform for AI agents. Cryptographic identity, governance, and access control.☆35Updated this week
- Put All Mirror in ONE☆12Feb 18, 2026Updated 2 weeks ago
- lncRNA-Py is a development package for applying machine learning and deep learning to the problem of lncRNA classification, i.e. predicti…☆12Jan 24, 2025Updated last year
- Optimization in python☆11Oct 5, 2018Updated 7 years ago
- ☆35Feb 6, 2026Updated last month
- ✏ Solidity support for VSCode☆10Jan 11, 2023Updated 3 years ago
- Secure access cloud terraform provider☆13Updated this week
- Repository for Scarf's documentation website☆10Updated this week
- GALL.AI (prev. Generall.AI) - Telegram Advanced AI Agent System Chat Bot☆14Feb 27, 2026Updated last week
- MVP for updated PEP 543 proposal☆14Feb 13, 2026Updated 3 weeks ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 25, 2026Updated last week
- ☆12Jun 12, 2023Updated 2 years ago
- An application for retrieving and viewing success metrics from Sonatype Nexus IQ☆17Feb 14, 2025Updated last year
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 8 months ago
- Gotchas with common approaches to block Salesforce Apex Trigger recursion, and alternate solutions☆11Dec 15, 2025Updated 2 months ago
- A Solidity spec suite to test parsers for language compliance.☆11Dec 31, 2017Updated 8 years ago
- OWASP Zed Attack Proxy plugin for py.test☆13Sep 10, 2015Updated 10 years ago
- ☆12Mar 14, 2022Updated 3 years ago
- HWP(한글 워드프로세서) 문서를 Markdown으로 변환하는 도구☆25Feb 28, 2026Updated last week
- ☆28Feb 27, 2026Updated last week
- This powerbi dashboards will help the Security team to analyze KBs, delivered monthly by Microsoft☆14Mar 9, 2022Updated 4 years ago
- re-hosted web identiy course from opensecuritytraining.info☆11Nov 7, 2025Updated 4 months ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago