datasec-lab / CodeBreakerLinks
[USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
☆52Updated 7 months ago
Alternatives and similar repositories for CodeBreaker
Users that are interested in CodeBreaker are comparing it to the libraries listed below
Sorting:
- ☆36Updated last year
- ☆65Updated 10 months ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆25Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆45Updated 4 months ago
- Agent Security Bench (ASB)☆137Updated 3 weeks ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆209Updated 8 months ago
- ☆85Updated last year
- [NeurIPS 2025] BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks and Defenses on Large Language Models☆226Updated last week
- ☆123Updated last year
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆160Updated 6 months ago
- ☆82Updated last month
- ☆24Updated 2 months ago
- The automated prompt injection framework for LLM-integrated applications.☆235Updated last year
- ☆36Updated last year
- ☆12Updated 7 months ago
- ☆27Updated last year
- Code to generate NeuralExecs (prompt injection for LLMs)☆25Updated 3 weeks ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆93Updated last year
- ☆50Updated last year
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆21Updated 2 months ago
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆48Updated 3 months ago
- ☆26Updated 9 months ago
- ☆17Updated last year
- ☆25Updated 4 years ago
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆52Updated 3 months ago
- This repository provides a benchmark for prompt injection attacks and defenses☆310Updated 2 weeks ago
- ☆23Updated 8 months ago
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Models☆47Updated 9 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆87Updated 9 months ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆14Updated last month