Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security
☆156Dec 19, 2025Updated 3 months ago
Alternatives and similar repositories for ai-ml-security
Users that are interested in ai-ml-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository for CoSAI workstream 3, AI Risk Governance☆23Feb 18, 2026Updated last month
- Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems☆44Mar 11, 2026Updated last week
- Technical Advisory Council☆136Updated this week
- Machine-readable specification for the attestation of security-relevant data.☆73Feb 24, 2026Updated 3 weeks ago
- Open Source Maturity Model☆16Apr 30, 2024Updated last year
- AIBOM Workshop RSA 2024☆15May 20, 2024Updated last year
- A CLI tool for creating secure by design/default source repos.☆28Jul 29, 2024Updated last year
- ☆147Updated this week
- A community wiki for all things AI/ML bill of materials (MLBOM, AIBOM) and transparency into AI/ML models.☆45Nov 8, 2024Updated last year
- OpenSSF Endusers Working Group☆28Mar 21, 2024Updated 2 years ago
- Repository for on-going work as part of the SBOM for AI Tiger Team effort.☆42Jul 28, 2025Updated 7 months ago
- Improve Software Bill of Materials (SBOM) tooling and training to encourage adoption☆112Feb 28, 2026Updated 3 weeks ago
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆108Mar 14, 2026Updated last week
- The Best Practices for OSS Developers working group is dedicated to raising awareness and education of secure code best practices for ope…☆999Updated this week
- Supply Chain Integrity Transparency and Trust ledger application using Confidential Consortium Framework (CCF)☆41Updated this week
- ☆31Updated this week
- This repository is for administrative documents for the CoSAI OASIS Open Project☆75Updated this week
- Supply Chain Query Tool☆13May 25, 2022Updated 3 years ago
- Formal specification of attestation mechanisms in Confidential Computing☆24Nov 22, 2025Updated 4 months ago
- ☆76Dec 10, 2025Updated 3 months ago
- OpenSSF Working Group on Securing Software Repositories☆128Dec 18, 2025Updated 3 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆86Feb 6, 2025Updated last year
- OpenSSF Security Tooling Working Group☆321Jul 6, 2025Updated 8 months ago
- ☆23Oct 26, 2021Updated 4 years ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- ☆18Feb 26, 2026Updated 3 weeks ago
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆68Updated this week
- A functional type system for policy inspection, audit and enforcement.☆14Aug 17, 2023Updated 2 years ago
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆33Apr 22, 2025Updated 11 months ago
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- ☆11Aug 17, 2023Updated 2 years ago
- The model for the information captured in SPDX version 3 standard.☆99Mar 14, 2026Updated last week
- ☆17Sep 14, 2022Updated 3 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- vexctl is a tool to attest VEX impact statements☆45Mar 27, 2023Updated 2 years ago
- ☆18Feb 2, 2026Updated last month
- Software Supply Chain Attribute Integrity (SCAI) Demos and CLI tools☆19Updated this week
- Umbrella Repository Service for TUF☆62Feb 23, 2026Updated last month
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago