
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
@gliff-ai/curate
Advanced tools
๐ Welcome in! ๐
This repository contains the Open Source code for gliff.aiโs CURATE product.
CURATE aims to allow data owners and their team to easily and efficiently organise their datasets of imagery with full version control and ability to assign annotation tasks for the purposes of developing imaging AI products. CURATE is just one part of gliff.aiโs growing privacy-preserving MLOps (Machine Learning Operations) platform. When the full gliff.ai platform is used, CURATE provides just one step in developing high-quality and auditable datasets that satisfy any relevant regulatory frameworks which enables our users to build world-changing and trustworthy AI models and products.
A preview build of the current main
branch is here.
โ We welcome contributions on this repository! โ
Looking for something specific? ๐
Run npm install @gliff-ai/curate
in your command line to install the package from the npm registry.
Frontend code should always be written in Typescript and transpiled using the options in tsconfig.json
in this repository. npm should always be used for package management.
npm run serve
will run a local webpack developer server for quick access.
As a standard, all code contributions should be linted with ESLint using .eslintrc.js
and formatted with Prettier. Note: HTML + CSS, mark-up and mark-down code are exemptions and should be formatted using Prettier but do not need to be linted.
npm run lint
will lint the codebase.
Our GitHub Actions will also lint any pull requests before they're merged.
All code contributions should be tested using both the Jest and React Testing Library.
npm run test
will run any existing tests in our codebase.
Our GitHub Actions will also test any pull requests before they're merged! These all must pass and have 2 reviewers approval before a pull request can merge. If one or a few fail and your troubleshooting is not giving an answer, please check out the gliff.ai Contribution Guide ๐ for further guidance.
GitHub Actions should only be included under the .github/workflows
path.
We welcome all contributors and any contributions on this project through the likes of feedback on or suggesting features and enhancements, raising bug problems, reporting on security vulnerabilities, reviewing code, requesting or creating tests, user testing etc. to ensure gliff.ai can help enable the best and biggest positive impact possible.
Sounds good and want to contribute to the project? ๐งโ๐ป
Please check the gliff.ai Contribution Guide ๐ before you get started. Donโt forget the gliff.ai Code of Conduct โ ๏ธ and gliff.ai Security Policy ๐ too!
A big thank you from the entire gliff.ai team to these fellow contributors (emoji key):
{{Contributor List - coming soon}}
Need some help? ๐ค Have a question? ๐ง
Reach out to the gliff.ai team at community@gliff.ai or on our GitHub discussions.
This code is licensed under a GNU AGPLv3 license ๐
Curious about our reasoning for this? Read about them here!
FAQs
gliff.ai CURATE
The npm package @gliff-ai/curate receives a total of 0 weekly downloads. As such, @gliff-ai/curate popularity was classified as not popular.
We found that @gliff-ai/curate demonstrated a not healthy version release cadence and project activity because the last version was released a year ago.ย It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socketโs AI scanner detected the supply chain attack and flagged the malware.
Security News
CISAโs 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.