These tools and metrics are designed to help AI actors develop and use trustworthy AI systems and applications that respect human rights and are fair, transparent, explainable, robust, secure and safe.
AI Vulnerability Database
As the first open-source, extensible knowledge base of AI failures, AVID aims to
- encompass coordinates of responsible ML such as security, ethics, and performance,
- build out a taxonomy of potential harms across these coordinates.
- house full-fidelity information (metadata, harm metrics, measurements, benchmarks, and mitigation techniques if any) on evaluation use cases of a harm (sub)category
- evaluate models and datasets are either open-source, or accessible through APIs.
AVID has two components: a taxonomy that provides a landing place of instances of AI system/model/dataset failures, and a database that actually stores information on such instances in a structured manner.
The AVID taxonomy is intended to serve as a common foundation for data science/ML, product, and policy teams to manage potential risks at different stages of a ML workflow. In spirit, this taxonomy is analogous to MITRE ATT&CK for cybersecurity vulnerabilities, and MITRE ATLAS for adversarial attacks on ML systems.
At a high level, the AVID taxonomy consists of two views, intended to facilitate the work of two different user personas.
Effect view: for the auditor persona that aims to assess risks for a ML system of components of it.
Lifecycle view: for the developer persona that aims to build an end-to-end ML system while being cognizant of potential risks.
Note that based on case-specific needs, people involved with building a ML system may need to operate as either of the above personas.
The database component of AVID stores instantiations of AI risks—categorized using the above taxonomy—using two base data classes: Vulnerability and Report. A vulnerability (vuln) is a high-level evidence of an AI failure mode, in line with the NIST CVEs.These are linked to the taxonomy through multiple tags, denoting the AI risk domains (Security, Ethics, Performance) this vulnerability pertains to, (sub)categories under that domain, as well as AI lifecycle stages.
A report is one example of a particular vulnerability occurring, and is potentially more granular and reproducible based on the references provided in that report.
As an example, the vuln AVID-2022-V001 is about gender bias in the large language model bert-base-uncased. This bias is measured through multiple reports, AVID-2022-R0001 and AVID-2022-R0002, which measure gender bias in two separate contexts, using different metrics and datasets, and record salient information and references on those measurements.
AVID is a project under active development. Our preliminary version (v0.1) is publicly available, and we are collaborating with multiple companies and nonprofits to release v1 by summer-end of 2023. Please see more details about our planned roadmap here.
About the tool
Country of origin:
Type of approach:
- ai auditing
- ai risk management
- ai vulnerabilities