Developer-first AI security scanner. Ceres is AI-SAST for repos: it inspects your code, prompts, configs, model artifacts, datasets, RAG docs, and AI supply chain for the security issues that traditional SAST/SCA tools miss. It runs locally, in pre-commit, and in CI.
ceres scan .
| Layer | Examples |
|---|---|
| Code | trust_remote_code=True, pickle.load, torch.load without weights_only=True, eval/exec, unrestricted agent tools, poisoned tool/MCP descriptions |
| Models | .pkl/.pickle artifacts, unsafe formats, unknown source/provenance, suspicious pickle opcodes, missing/changed SHA-256, safetensors tensor/layer drift, NaN/Inf/range anomalies, tokenizer / chat-template / LoRA-base drift |
| Datasets | missing manifest, missing/stale hash, source not in allowlist, duplicate-rate spikes, label distribution drift vs. baseline, sudden rare-trigger trigrams |
| RAG corpus | prompt-injection phrases (ignore previous instructions, etc.), hidden HTML / display:none, HTML comments with instructions, zero-width / bidi control chars, large base64 blobs |
| Prompts | user input templated into system context; optional inline secret checks when explicitly enabled |
| Supply chain | unpinned Hugging Face model references in configs, unpinned dependencies, missing lockfiles, unpinned Docker images, remote install scripts, pip-audit results normalized into Ceres findings; gitleaks only when explicitly enabled |
| AI-BOM | warns when models/datasets are present but no ai-bom.json exists |
Full docs:
Ceres never imports model files. Model artifacts are inspected statically
(pickle opcode decoding only, no __reduce__ execution) with a 64 MB hard cap.
pip install ceres-scanner
# or, from this repo:
pip install -e .Optional integrations: install pip-audit
or, if you explicitly want generic secret scanning inside Ceres,
gitleaks on PATH. Ceres detects
enabled tools and folds their findings into the same report. If policy
enables an external scanner but it is missing, Ceres emits a low-severity
ceres.supplychain.scanner_unavailable finding so CI does not silently skip coverage.
ceres init # writes ceres.yml policy
ceres scan . # human-readable scan
ceres scan . --sarif-out out.sarif --json-out out.json
ceres baseline . # snapshot dataset+model+tool metadata -> .ceres/baseline.json
ceres bom . --out ai-bom.json # Ceres AI-BOM
ceres list-rules # show known rule IDsscan exits non-zero when findings at gated severities are present (defaults:
critical and high fail; medium warns).
A typical Ceres use case is reviewing a pull request for an AI support agent. The PR changes model loading code, adds a new RAG document, updates a training dataset, and touches dependencies.
ceres scan . --json-out ceres-report.json --sarif-out ceres.sarifExample findings:
CRITICAL ceres.model.loader.remote_code_enabled
src/app.py:10
Model loader uses trust_remote_code=True.
CRITICAL ceres.model.artifact.pickle_format
models/final.pkl
Pickle-based model artifact may execute code during deserialization.
HIGH ceres.rag.instruction.ignore_context
docs/vendor_policy.md:5
RAG document contains instruction-like text.
HIGH ceres.dataset.hash_drift
data/train.csv
Dataset hash differs from manifest declaration.
MEDIUM ceres.supplychain.dependency_unpinned
requirements.txt:1
Dependency is not pinned to an exact version.
For a local demo from this repository:
ceres scan examples/vulnerable-ai-repo
ceres scan examples/vulnerable-ai-repo \
--json-out examples/vulnerable-ai-repo/ceres-report.json \
--sarif-out examples/vulnerable-ai-repo/ceres.sarif
ceres bom examples/vulnerable-ai-repo
ceres baseline examples/vulnerable-ai-repoThe vulnerable example is expected to fail. The clean example should pass:
ceres scan examples/clean-ai-repoceres.yml controls gates, allowlists, and waivers. The defaults are
opinionated: pickle formats are blocked, trust_remote_code is denied, and
generic secret scanning is off by default so Ceres stays focused on AI-model and
AI-system risk.
severity_gate:
critical: fail
high: fail
medium: warn
low: info
model_policy:
allowed_formats: [safetensors, onnx, gguf]
blocked_formats: [pkl, pickle]
require_revision_pin: true
allow_trust_remote_code: false
waivers:
- rule_id: ceres.model.loader.remote_code_enabled
file: src/research_loader.py
reason: "Research-only script, not shipped"
expires: "2026-12-01"
approved_by: "security-team"Expired waivers stop suppressing findings and are surfaced as a
ceres.policy.waiver_expired finding so they don't quietly rot.
ceres baseline .
git add .ceres/baseline.jsonOnce a baseline exists, Ceres compares dataset fingerprints (row count, duplicate rate, label distribution, top trigrams), model/tokenizer state, and tool metadata descriptions against it. Drift beyond policy thresholds becomes a finding.
Ceres should scan model layers and tensors for poisoning indicators, but it should not claim that static layer inspection can prove a layer is poisoned. Backdoors can be subtle and may only show up under specific triggers or runtime behavior.
Ceres currently performs safe .safetensors tensor baseline checks without
importing model code or loading tensors into memory. It parses the safetensors
header, records tensor names, dtypes, shapes, offsets, SHA-256 hashes, and
compact numeric stats in the baseline, then compares future scans against that
baseline.
Implemented static checks:
- per-tensor SHA-256 hashes compared with a known-good baseline
- unexpected layer names, missing layers, added layers, or shape changes
- dtype changes
- NaN/Inf values and configured absolute-value range anomalies
- L2 norm drift and sparsity drift compared with baseline
- LoRA adapter metadata changes such as base model mismatch
- tokenizer, special-token, and chat-template changes that can hide behavior shifts outside obvious weight tensors
Planned checks:
- cross-layer outlier scoring for tensor families with similar roles
- ONNX/GGUF metadata and graph-level inspection
Good finding wording:
HIGH ceres.model.tensor.norm_drift
models/adapter.safetensors
Layer "lm_head.weight" changed shape and has unusually large norm drift compared
with baseline.
Recommended policy: use layer/tensor scanning as a baseline-diff and anomaly detector, then combine it with provenance, signatures, dataset checks, and dynamic evaluation before making a poisoning claim.
See Model security and tensor scanning for the implemented model rules, baseline format, and policy knobs.
# .github/workflows/ceres.yml
name: Ceres
on: [pull_request, push]
jobs:
ceres:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions/setup-python@v5
with: { python-version: "3.11" }
- run: pip install ceres-scanner
- run: ceres scan . --sarif-out ceres.sarif
- uses: github/codeql-action/upload-sarif@v3
if: always()
with: { sarif_file: ceres.sarif }# .pre-commit-config.yaml
repos:
- repo: local
hooks:
- id: ceres
name: Ceres AI security scanner
entry: ceres scan . --policy ceres.yml
language: system
pass_filenames: falseCeres is a young project. The MVP covers static rules for code, models, data,
RAG, prompts, and supply chain, plus AI-BOM and baselines. Dynamic red-team and
fuzz testing live downstream of garak / promptfoo / PyRIT and are not in
scope here.
See examples/vulnerable-ai-repo/ for an example that trips most rules and
examples/clean-ai-repo/ for a quiet baseline.