Supply chain security for ML
☆224Updated this week
Alternatives and similar repositories for model-transparency
Users that are interested in model-transparency are comparing it to the libraries listed below
Sorting:
- Kubernetes controller to validate AI models☆26Updated this week
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆145Dec 19, 2025Updated 2 months ago
- A command-line interface tool for creating, managing, and verifying Content Provenance and Authenticity (C2PA) manifests for machine lear…☆21Feb 16, 2026Updated last week
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆108Updated this week
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆33Apr 22, 2025Updated 10 months ago
- SLSA Proposals☆11Jan 29, 2024Updated 2 years ago
- Macaron is an extensible supply-chain security analysis framework from Oracle Labs that supports a wide range of build systems and CI/CD …☆187Updated this week
- ☆76Dec 10, 2025Updated 2 months ago
- An query language and interactive tooling to work with SBOM data.☆15Oct 7, 2024Updated last year
- Format agnostic SBOM tooling☆132Nov 20, 2025Updated 3 months ago
- Verify provenance from SLSA compliant builders☆310Nov 20, 2025Updated 3 months ago
- Log monitor for Rekor to verify immutability and monitor entries☆47Updated this week
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Jan 20, 2026Updated last month
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated last year
- in-toto Attestation Framework☆326Feb 17, 2026Updated last week
- ☆33Aug 14, 2025Updated 6 months ago
- A specification for signing methods and formats used by Secure Systems Lab projects.☆94Nov 10, 2025Updated 3 months ago
- Go library for Sigstore signing and verification☆18Sep 29, 2023Updated 2 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- ORBIT: Open Resources for Baselines, Interoperability, and Tooling☆21Updated this week
- Go implementation of The Update Framework heavily influenced by python-tuf☆14Mar 7, 2024Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆118Feb 7, 2024Updated 2 years ago
- Software Supply Chain Security Platform☆375Updated this week
- Sigstore's Protocol Buffer specifications☆34Feb 20, 2026Updated last week
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆45Oct 30, 2023Updated 2 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Throw a tag at it and it comes back with a checksum.☆155Feb 21, 2026Updated last week
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆517Updated this week
- Fuzzing Deep Learning Libraries Via Mining Security Knowledge from Open Source☆16May 14, 2024Updated last year
- ☆19Jun 25, 2024Updated last year
- Securing Alice's, Bob's and Carl's software supply chain using in-toto☆104Feb 11, 2026Updated 2 weeks ago
- Open Source Vulnerability schema.☆235Feb 20, 2026Updated last week
- A universal SBOM representation in protocol buffers☆316Feb 18, 2026Updated last week
- Umbrella Repository Service for TUF☆60Updated this week
- Software Supply Chain Attribute Integrity (SCAI) Demos and CLI tools☆19Feb 6, 2026Updated 3 weeks ago
- 🔴🟡🟢 The Amazing Multipurpose Policy Engine (and L)☆39Updated this week
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆18Jul 20, 2021Updated 4 years ago
- Collating an overview of the open source software supply chain landscape -- and synthesizing that survey in a hopefully-useful way.☆33Apr 4, 2023Updated 2 years ago
- ☆26Jun 10, 2025Updated 8 months ago