Supply chain security for ML
☆230Apr 21, 2026Updated last week
Alternatives and similar repositories for model-transparency
Users that are interested in model-transparency are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Go library for Sigstore signing and verification☆17Sep 29, 2023Updated 2 years ago
- A command-line interface tool for creating, managing, and verifying Content Provenance and Authenticity (C2PA) manifests for machine lear…☆21Updated this week
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆109Updated this week
- Repository for CoSAI Workstream 1, Software Supply Chain Security for AI Systems☆48Mar 11, 2026Updated last month
- ☆81Dec 10, 2025Updated 4 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆165Dec 19, 2025Updated 4 months ago
- Sigstore's Protocol Buffer specifications☆34Apr 20, 2026Updated last week
- Verify provenance from SLSA compliant builders☆321Mar 9, 2026Updated last month
- in-toto Attestation Framework☆333Updated this week
- A TUF repository and signing tool☆44Updated this week
- Go implementation of The Update Framework heavily influenced by python-tuf☆14Mar 7, 2024Updated 2 years ago
- Macaron is an extensible supply-chain security analysis framework from Oracle Labs that supports a wide range of build systems and CI/CD …☆192Updated this week
- Open Source Vulnerability schema.☆246Apr 24, 2026Updated last week
- Format agnostic SBOM tooling☆137Nov 20, 2025Updated 5 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆33Apr 22, 2025Updated last year
- Go implementation of witness☆49Apr 21, 2026Updated last week
- Software Supply Chain Attribute Integrity (SCAI) Demos and CLI tools☆19Apr 23, 2026Updated last week
- A specification for signing methods and formats used by Secure Systems Lab projects.☆98Nov 10, 2025Updated 5 months ago
- in-toto Enhancements☆20Feb 17, 2025Updated last year
- Log monitor for Rekor to verify immutability and monitor entries☆51Updated this week
- Software Supply Chain Security Platform☆399Apr 24, 2026Updated last week
- Trusty Dependency Risk Action☆10Feb 12, 2025Updated last year
- Securing Alice's, Bob's and Carl's software supply chain using in-toto☆104Feb 11, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- General sigstore community repo☆45Apr 23, 2026Updated last week
- sigstore maven plugin☆19Jul 22, 2024Updated last year
- Throw a tag at it and it comes back with a checksum.☆175Apr 21, 2026Updated last week
- This repository is for administrative documents for the CoSAI OASIS Open Project☆82Apr 21, 2026Updated last week
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆523Updated this week
- Umbrella Repository Service for TUF☆67Apr 17, 2026Updated 2 weeks ago
- ☆19Jun 25, 2024Updated last year
- ☆23Mar 13, 2023Updated 3 years ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆120Feb 7, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Initial discussions on signatures of WebAssembly modules.☆18May 18, 2022Updated 3 years ago
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆19Jul 20, 2021Updated 4 years ago
- Supply-chain Levels for Software Artifacts☆1,852Updated this week
- ☆26Mar 17, 2026Updated last month
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- Making transparency normal!☆24Dec 18, 2023Updated 2 years ago
- A universal SBOM representation in protocol buffers☆322Updated this week