-
Bad documenttaion. not very long errors
Detecting toxicity in outputs generated by Large Language Models (LLMs) is crucial for ensuring that these models produce safe, respectful, and appropriate con…
-
**Threat models**
**Mitigations**
-
I'd like to be able to programmatically generate threat models in a deciduous.app compatible format.
-
### Theme
Problem Statement 1, Hill 2
> Law enforcement has technology embedded in their equipment to help objectively assess accurate threat level and provide guidance on appropriate threat respons…
-
It would be extremely helpful if the AzureTemplate.v3.tb file in this repo could be stored in the generic microsoft/threat-modeling-templates repo. Currently the microsoft/threat-modeling-templates c…
-
During a discussion on Threat Modelling, where it was appreciated that we had public Threat Models, I received this feedback from Loren Kohnfelder.
I am just quoting it here, hoping that it will b…
-
These are really useful assets for demonstrating how to diagraming the system, "What are we working on".
I don't see any artifacts that capture the threats that have been identified by these model…
-
https://github.com/ryao/zfs/security/code-scanning/824
https://github.com/ryao/zfs/blob/3881dd42bbfb7297f08e796c38b35d54e11ac500/cmd/zpool/zpool_main.c#L9431-L9431
Does telling a user his own us…
-
Besides MITRE ATTACK, there are other frameworks from MITRE and US Government that should be available to Unfetter. Design how that would operate with the following notes:
- [x] Attack patterns ca…
-
Interpret some of the roles played by Video Processing Models in Surveillance and security measures