jasebell / ai-bill-of-materials
What's in the black box? As we go forward we will need a model and machine readable bill of materials.
☆12Updated last year
Alternatives and similar repositories for ai-bill-of-materials:
Users that are interested in ai-bill-of-materials are comparing it to the libraries listed below
- The Great Multi-Factor Authentication (MFA) Distribution Project of the Open Source Security Foundation (OpenSSF). We work to distribute …☆54Updated 3 years ago
- Security-focused Chaos Experiments for DevSecOps Teams☆25Updated 3 months ago
- ☆16Updated 8 months ago
- Split-Trust Encryption Tool for ubiquitous data encryption.☆38Updated last week
- Mistral-7B, SDXL LoRA pipelines using Dagger.io: pipelines as (python) code☆14Updated last year
- eBPF-Direct is a high-performance serverless execution layer that runs functions directly inside the Linux kernel using eBPF☆24Updated 3 weeks ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated 2 weeks ago
- ☆24Updated last year
- OpenSSF Project Template☆18Updated last year
- Oblivious HTTP implementation☆27Updated 10 months ago
- Security and compliance proxy for LLM APIs☆46Updated last year
- A repository of resources discussing the Public Sectors push for Zero Trust along with associated resources for learning on the topic.☆39Updated 3 years ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆51Updated last year
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- ☆11Updated last year
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Updated last year
- Practical Library Of Threats 4 Artificial Intelligence☆23Updated 3 weeks ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year
- A dashboard framework for visualizing complex data sets on T1V multi-panel displays☆20Updated 2 years ago
- Architecture - design and implementation of the D4 project architecture☆16Updated 3 years ago
- Provide search for Prow job results from OpenShift CI☆12Updated 2 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- ☆62Updated this week
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- ☆29Updated 2 months ago
- TACOS framework structural details☆20Updated last year
- ☆20Updated 3 weeks ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆30Updated last year
- ☆35Updated 2 months ago