Skip to content

10. Appendix — additional resources

While working through SANS training and organizing these notes, I consulted and recommend the following materials for readers who want to go deeper. (Yi, 1/5/2026)

Entries are deduplicated; some titles appear in both industry articles and open-source repos under slightly different names.

Threat modeling & design

  • Deciduous — decision tree generator for threat modeling
  • Streamlit — common framework for quick ML/security engineering dashboards and prototypes

OWASP cheat sheets (GenAI / ML)

Platforms, pipelines, and MLSecOps

Model tooling, scanners, and robustness

Agents, computer use, and memory

RAG, vectors, and infrastructure

Signing, supply chain, and BOM

Evaluation, RAG tradeoffs, and training modes

  • PAL (program-aided language models) — start from the paper: PAL: program-aided language models (arXiv)
  • “Ultrathink” in Claude Code — product/workflow terminology; see current Anthropic / Claude Code documentation.
  • ANI / AGI / ASI — informal taxonomy of capability levels; treat as conceptual vocabulary, not a standard.
  • Workload identity on agentic platforms — see your platform’s IAM docs (a Kagenti identity–style PDF may be vendor-specific training material).

Cybersecurity-focused small language models

Semgrep, MCP, and IDE guardrails

  • Semgrep — static analysis; pairs with MCP / IDE workflows for generated code review (see Semgrep docs for MCP server details)

Jailbreaks and misuse research (examples)

  • “Do Anything Now” (DAN) / jailbreak families — academic and industry write-ups change frequently; search for DAN jailbreak ChatGPT or OWASP GenAI risk entries for curated context.
  • Prefer primary sources (papers, OWASP, vendor security blogs) over orphaned .md filenames without a stable URL.

This appendix is a living list—prune duplicates, fix stale URLs, and add your own org’s internal standards where appropriate.