☆51Jul 16, 2024Updated last year
Alternatives and similar repositories for SafeCoder
Users that are interested in SafeCoder are comparing it to the libraries listed below
Sorting:
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆33Mar 6, 2026Updated 2 weeks ago
- INDICT: Code Generation with Internal Dialogues of Critiques for Both Security and Helpfulness☆14Nov 10, 2025Updated 4 months ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Feb 26, 2026Updated 3 weeks ago
- CodeGuard+: Constrained Decoding for Secure Code Generation☆20Jul 30, 2024Updated last year
- ☆12Dec 22, 2025Updated 2 months ago
- ☆128Jul 14, 2024Updated last year
- ☆13Oct 11, 2024Updated last year
- [NeurIPS 2024 / ICML 2025] LLM Quantization Attacks☆49Jan 15, 2026Updated 2 months ago
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆52Nov 7, 2025Updated 4 months ago
- Repository for PrimeVul Vulnerability Detection Dataset☆226Sep 7, 2024Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆85Nov 4, 2023Updated 2 years ago
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆84May 13, 2025Updated 10 months ago
- This repository contains the replication package of our paper "Assessing the Security of GitHub Copilot’s Generated Code - A Targeted Rep…☆10Nov 16, 2023Updated 2 years ago
- ☆57Oct 4, 2024Updated last year
- ☆16Oct 2, 2024Updated last year
- Code and data for "Impact of Evaluation Methodologies on Code Summarization" in ACL 2022.☆10Sep 6, 2022Updated 3 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆38Mar 8, 2023Updated 3 years ago
- [ICLR 2024] Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain☆10Nov 24, 2025Updated 3 months ago
- [SANER 2023] MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation☆15Jul 13, 2024Updated last year
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆75Oct 29, 2025Updated 4 months ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆19Jun 7, 2023Updated 2 years ago
- Simplified Source Code Pre-Training for Vulnerability Detection☆115Dec 4, 2025Updated 3 months ago
- ☆12Jul 8, 2023Updated 2 years ago
- ☆92Jan 30, 2026Updated last month
- An Algorithm to Quantify Robustness of Recurrent Neural Networks☆49Apr 24, 2020Updated 5 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆76Jun 24, 2022Updated 3 years ago
- For our ACL25 Paper: Can Language Models Replace Programmers? RepoCod Says ‘Not Yet’ - by Shanchao Liang and Yiran Hu and Nan Jiang and L…☆26Aug 27, 2025Updated 6 months ago
- ☆19Aug 23, 2024Updated last year
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆19Jul 2, 2025Updated 8 months ago
- Data and Code for StructuredRegex.☆15Nov 16, 2023Updated 2 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆64May 4, 2025Updated 10 months ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆35Apr 18, 2023Updated 2 years ago
- Making code edting up to 7.7x faster using multi-layer speculation☆24Feb 20, 2025Updated last year
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆21Oct 29, 2022Updated 3 years ago
- ☆54Nov 19, 2022Updated 3 years ago
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- Debiasing Through Data Attribution☆12May 23, 2024Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆57Mar 22, 2025Updated 11 months ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago