🧩 Software Supply Chain Security

  • Shadow Supply Chain: Simulates real-world transitive dependency attacks.
  • DepLoom: Visualizes hidden dependencies in software supply chains.
  • ChainSaw: CLI tool to trace and sever risky dependency chains.
  • SecPatchSim: Simulates patch timing risks in third-party components.
  • ModGuard: Enforces module trust policies in your build pipeline.
  • TrustedBuilder: Hardens your build systems against tampering and injection.

🤖 AI/ML Security

  • AI Drift: A study in hallucinating threat models using generative AI.
  • PromptFence: Guardrails against prompt injection and LLM misuse.
  • ModelTamer: Tool for controlling over-permissive ML behaviour.
  • VectorSentry: Monitors for malicious vector store abuse in RAG pipelines.
  • LangLeak: Detects and remediates unintentional LLM info leaks.
  • AIPromptHound: Tracks and audits prompt modifications across flows.

🔐 General AppSec / DevSecOps

  • FDX Role Audit Tool: Automates overpermission checks for Snowflake roles.
  • ThreatLinter: CI plugin to lint threat models and catch gaps early.
  • SecPath: Maps sensitive data flows to control access risks.
  • AutoFixer: Automatically remediates common Iac security misconfigurations.

Want to know more or collaborate? [Head to the Contact page]