{"data":{"full_name":"vmayoral/ExploitFlow","name":"ExploitFlow","description":"A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.","stars":37.0,"forks":2.0,"language":"Python","license":"Apache-2.0","archived":0.0,"subcategory":"ai-red-teaming","last_pushed_at":"2023-07-27T18:30:14+00:00","pypi_package":null,"npm_package":null,"downloads_monthly":0.0,"dependency_count":0.0,"commits_30d":null,"reverse_dep_count":0.0,"maintenance_score":0.0,"adoption_score":7.0,"maturity_score":16.0,"community_score":6.0,"quality_score":29.0,"quality_tier":"experimental","risk_flags":"['stale_6m', 'no_package', 'no_dependents']"},"meta":{"timestamp":"2026-04-06T08:12:04.059464+00:00"}}