Discover and explore top open-source AI tools and projects—updated daily.
iris-sastNeurosymbolic framework for code vulnerability detection
Top 98.8% on SourcePulse
IRIS is a neurosymbolic framework designed for automated security vulnerability detection in code. It uniquely combines Large Language Models (LLMs) with traditional static analysis techniques to identify potential security flaws. The framework targets developers and security researchers, offering an advanced approach to sift through codebases for vulnerabilities, thereby enhancing software security posture.
How It Works
IRIS employs a neurosymbolic architecture where LLMs play a dual role: generating source and sink specifications crucial for static analysis, and filtering out false positives from identified vulnerable paths. The core process involves taking a project and a specific Common Weakness Enumeration (CWE) as input. IRIS then performs static analysis on the project, leveraging the LLM-generated specifications, to output a set of potential vulnerabilities matching the specified CWE.
Quick Start & Requirements
docker build, docker run). Native setup requires Conda (conda env create -f environment.yml, conda activate iris).pytorch-cuda=12.1) for hardware acceleration.data/build_info.csv, configurable via dep_configs.json. SDKMAN! is suggested for management.CODEQL_DIR or added to the system PATH.Highlighted Details
Maintenance & Community
IRIS is a collaborative project between researchers at Cornell University and the University of Pennsylvania.
Licensing & Compatibility
The project is released under the MIT license, permitting broad use and compatibility with closed-source projects.
Limitations & Caveats
The README does not explicitly detail known limitations, unsupported platforms, or alpha status. Native setup requires careful configuration of multiple complex dependencies (CUDA, Java build tools, CodeQL).
2 days ago
Inactive