usnistgov / ai-bugfinder-testbedLinks
A static analyzer powered by AI
☆23Updated last year
Alternatives and similar repositories for ai-bugfinder-testbed
Users that are interested in ai-bugfinder-testbed are comparing it to the libraries listed below
Sorting:
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆83Updated 3 weeks ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆30Updated 2 years ago
- ☆27Updated 2 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated last week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆160Updated last year
- Code Hierarchy Exploration Net (chen)☆24Updated this week
- ☆32Updated 3 weeks ago
- Static malware analysis using python☆12Updated 7 years ago
- ☆36Updated last year
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆28Updated last year
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.☆48Updated last year
- A fork of Bandit tool with patterns to identifying malicious python code.☆28Updated 3 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆300Updated this week
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆134Updated 2 years ago
- Modular framework for file information extraction and dependency analysis to generate accurate SBOMs☆39Updated this week
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆64Updated last week
- Monthly CVE Stats☆44Updated last month
- Home page of project "KB"☆133Updated 10 months ago
- Securibench Micro is a benchmark for static analysis tools for security.☆26Updated 7 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 3 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆79Updated 4 years ago
- A community collection of security reviews of open source software components.☆96Updated last year
- A very simple open source implementation of Google's Project Naptime☆184Updated 10 months ago
- ☆155Updated 4 months ago
- ☆48Updated this week
- ☆52Updated last year
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆97Updated last month
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆135Updated last week
- Generate CPG for multiple languages for code and threat analysis☆11Updated 2 years ago
- Security Harness Engineering for Robust Program Analysis☆109Updated last week