Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems
☆43Mar 3, 2026Updated last week
Alternatives and similar repositories for ws1-supply-chain
Users that are interested in ws1-supply-chain are comparing it to the libraries listed below
Sorting:
- Repository for CoSAI workstream 3, AI Risk Governance☆23Feb 18, 2026Updated 2 weeks ago
- Repository for CoSAI workstream 2, Preparing Defenders for a Changing Cybersecurity Landscape☆48Updated this week
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆90Updated this week
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆64Feb 19, 2026Updated 2 weeks ago
- SLSA Proposals☆11Jan 29, 2024Updated 2 years ago
- This repository is dedicated to providing comprehensive mappings of the OWASP Top 10 vulnerabilities for Large Language Models (LLMs) to …☆31Feb 15, 2024Updated 2 years ago
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆152Dec 19, 2025Updated 2 months ago
- A comprehensive database of Model Context Protocol vulnerabilities, security research, and exploits☆34Feb 16, 2026Updated 3 weeks ago
- Supply chain security for ML☆226Mar 2, 2026Updated last week
- Writeups of challenges and CTFs I participated in☆87Aug 25, 2025Updated 6 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆104Oct 13, 2025Updated 4 months ago
- ☆12Oct 13, 2022Updated 3 years ago
- ☆12Aug 1, 2025Updated 7 months ago
- Secure access cloud terraform provider☆13Updated this week
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- SageMaker Experiments and DVC☆17Aug 22, 2022Updated 3 years ago
- A plugin for llm to support structured outputs.☆13Feb 1, 2025Updated last year
- ☆11Feb 15, 2022Updated 4 years ago
- Delay Differential Equations in Haskell☆11Dec 4, 2018Updated 7 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 25, 2026Updated last week
- Repo containing documentation and explanation for CSET's harm taxonomy of incidents from AIID.☆18Jun 21, 2024Updated last year
- A toy symbolic algebra / calculus library in Haskell☆12Oct 4, 2015Updated 10 years ago
- ☆10Jun 30, 2016Updated 9 years ago
- Get a council of LLMs to advise consult for you! A plugin for the llm cli utility☆16Feb 1, 2025Updated last year
- Fourmolu GitHub Action☆13Oct 25, 2024Updated last year
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 10 months ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- ☆11Dec 19, 2024Updated last year
- KaTeX + coloring + interactivity to make equations explained well (prototype)☆19Dec 31, 2025Updated 2 months ago
- ☆12Jun 12, 2023Updated 2 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- A bunch of extra functionality for Hakyll-based sites.☆11Sep 30, 2015Updated 10 years ago
- Reliable AI Manifesto☆29Nov 3, 2025Updated 4 months ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- neovim plugin for ghcid☆16Dec 8, 2025Updated 3 months ago