☆53Jul 16, 2024Updated last year
Alternatives and similar repositories for SafeCoder
Users that are interested in SafeCoder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆34Mar 6, 2026Updated last month
- INDICT: Code Generation with Internal Dialogues of Critiques for Both Security and Helpfulness☆14Nov 10, 2025Updated 4 months ago
- CodeGuard+: Constrained Decoding for Secure Code Generation☆20Jul 30, 2024Updated last year
- ☆12Dec 22, 2025Updated 3 months ago
- ☆128Jul 14, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆13Oct 11, 2024Updated last year
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆51Nov 7, 2025Updated 5 months ago
- Repository for PrimeVul Vulnerability Detection Dataset☆231Sep 7, 2024Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆87Nov 4, 2023Updated 2 years ago
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆84May 13, 2025Updated 10 months ago
- ☆2May 27, 2025Updated 10 months ago
- This repository contains the replication package of our paper "Assessing the Security of GitHub Copilot’s Generated Code - A Targeted Rep…☆10Nov 16, 2023Updated 2 years ago
- ☆57Oct 4, 2024Updated last year
- ☆15Oct 2, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code and data for "Impact of Evaluation Methodologies on Code Summarization" in ACL 2022.☆10Sep 6, 2022Updated 3 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆39Mar 8, 2023Updated 3 years ago
- [ICLR 2024] Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain☆10Nov 24, 2025Updated 4 months ago
- [SANER 2023] MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation☆15Jul 13, 2024Updated last year
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆76Oct 29, 2025Updated 5 months ago
- [NeurIPS 2024] Efficiency for Free: Ideal Data Are Transportable Representations☆19Jan 19, 2025Updated last year
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆19Jun 7, 2023Updated 2 years ago
- Simplified Source Code Pre-Training for Vulnerability Detection☆117Dec 4, 2025Updated 4 months ago
- ☆12Jul 8, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆92Jan 30, 2026Updated 2 months ago
- An Algorithm to Quantify Robustness of Recurrent Neural Networks☆49Apr 24, 2020Updated 5 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆77Jun 24, 2022Updated 3 years ago
- For our ACL25 Paper: Can Language Models Replace Programmers? RepoCod Says ‘Not Yet’ - by Shanchao Liang and Yiran Hu and Nan Jiang and L…☆26Aug 27, 2025Updated 7 months ago
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆20Jul 2, 2025Updated 9 months ago
- ☆20Aug 23, 2024Updated last year
- Making code edting up to 7.7x faster using multi-layer speculation☆23Feb 20, 2025Updated last year
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆21Oct 29, 2022Updated 3 years ago
- ☆56Nov 19, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- Debiasing Through Data Attribution☆13May 23, 2024Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆57Mar 22, 2025Updated last year
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- ☆18Jun 18, 2025Updated 9 months ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆70Aug 14, 2025Updated 7 months ago
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆30Mar 8, 2022Updated 4 years ago