Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
11 sources · matching filters · sorted by citation density
Sort
ACybersecurity1 source
01

Open-source project for signing, verifying, and protecting software supply chains. Keyless signing for artifacts.

Test your knowledge · A13
BApplied AI in Security1 source
01

Bug bounty platform focused on AI/ML vulnerabilities. Real-world vulnerability data in ML frameworks and models. Good for grounding tool security questions in actual discovered vulnerabilities.

Test your knowledge · B7
CCybersecurity of AI Systems9 sources
01

Seminal backdoor attack paper. Demonstrated trojaned models in transfer learning scenarios. Foundational for AI supply chain security questions.

Test your knowledge · C3
02

Hugging Face's safe serialization format for ML models. Prevents arbitrary code execution from pickle-based attacks.

GuideFoundationalC3 · AI Supply Chain SecurityNEW · 1mo ago
Test your knowledge · C3
03

The largest model hub. Security features: malware scanning, pickle scanning, safetensors format. Questions on model provenance, serialization risks (pickle exploits), and model marketplace trust.

ToolIntermediateC3 · AI Supply Chain SecurityNEW · 22d ago
Test your knowledge · C3
04

Security best practices for using Hugging Face Hub — model scanning, SafeTensors, access controls, and supply chain considerations.

GuideFoundationalC3 · AI Supply Chain SecurityNEW · 1mo ago
Test your knowledge · C3
05

Discovered 100+ malicious models on Hugging Face exploiting pickle deserialization for code execution. Real-world evidence of AI supply chain attacks. Good for scenario-based questions.

GuideIntermediateC3 · AI Supply Chain SecurityNEW · 22d ago
Test your knowledge · C3
06

Extending software bill of materials concepts to AI: model cards, data cards, training provenance. Emerging standard for AI supply chain transparency.

FrameworkIntermediateC3 · AI Supply Chain SecurityNEW · 22d ago
Test your knowledge · C3
07

Framework for ensuring the integrity of software artifacts throughout the supply chain. Applicable to ML model pipelines.

FrameworkIntermediateC3 · AI Supply Chain SecurityNEW · 1mo ago
Test your knowledge · C3
08

Top 10 security risks specific to machine learning systems, including supply chain attacks, data poisoning, and model theft.

Test your knowledge · C1
09

Security audit firm with deep AI/ML expertise. Published research on pickle deserialization attacks, model file format security, and ML pipeline vulnerabilities. Technical depth from a security-first perspective.

Test your knowledge · C6

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.