@blamejs/exceptd-skills 0.12.11 → 0.12.15

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (91) hide show
  1. package/CHANGELOG.md +243 -0
  2. package/bin/exceptd.js +299 -48
  3. package/data/_indexes/_meta.json +49 -48
  4. package/data/_indexes/activity-feed.json +13 -5
  5. package/data/_indexes/catalog-summaries.json +51 -29
  6. package/data/_indexes/chains.json +3238 -3210
  7. package/data/_indexes/frequency.json +3 -0
  8. package/data/_indexes/jurisdiction-map.json +5 -3
  9. package/data/_indexes/section-offsets.json +712 -685
  10. package/data/_indexes/theater-fingerprints.json +1 -1
  11. package/data/_indexes/token-budget.json +355 -340
  12. package/data/atlas-ttps.json +144 -129
  13. package/data/attack-techniques.json +339 -0
  14. package/data/cve-catalog.json +515 -475
  15. package/data/cwe-catalog.json +1081 -759
  16. package/data/exploit-availability.json +63 -15
  17. package/data/framework-control-gaps.json +867 -843
  18. package/data/rfc-references.json +276 -276
  19. package/keys/EXPECTED_FINGERPRINT +1 -0
  20. package/lib/auto-discovery.js +21 -4
  21. package/lib/cross-ref-api.js +39 -6
  22. package/lib/cve-curation.js +505 -47
  23. package/lib/lint-skills.js +217 -15
  24. package/lib/playbook-runner.js +1224 -183
  25. package/lib/prefetch.js +121 -8
  26. package/lib/refresh-external.js +261 -95
  27. package/lib/refresh-network.js +208 -18
  28. package/lib/schemas/manifest.schema.json +16 -0
  29. package/lib/scoring.js +83 -7
  30. package/lib/sign.js +112 -3
  31. package/lib/source-ghsa.js +219 -37
  32. package/lib/source-osv.js +381 -122
  33. package/lib/validate-catalog-meta.js +64 -9
  34. package/lib/validate-cve-catalog.js +213 -7
  35. package/lib/validate-indexes.js +88 -37
  36. package/lib/validate-playbooks.js +469 -0
  37. package/lib/verify.js +313 -16
  38. package/manifest-snapshot.json +1 -1
  39. package/manifest-snapshot.sha256 +1 -0
  40. package/manifest.json +73 -73
  41. package/orchestrator/dispatcher.js +21 -1
  42. package/orchestrator/event-bus.js +52 -8
  43. package/orchestrator/index.js +279 -20
  44. package/orchestrator/pipeline.js +63 -2
  45. package/orchestrator/scanner.js +32 -10
  46. package/orchestrator/scheduler.js +196 -20
  47. package/package.json +3 -1
  48. package/sbom.cdx.json +9 -9
  49. package/scripts/check-manifest-snapshot.js +32 -0
  50. package/scripts/check-sbom-currency.js +65 -3
  51. package/scripts/check-test-coverage.js +142 -19
  52. package/scripts/predeploy.js +110 -40
  53. package/scripts/refresh-manifest-snapshot.js +55 -4
  54. package/scripts/validate-vendor-online.js +169 -0
  55. package/scripts/verify-shipped-tarball.js +106 -3
  56. package/skills/ai-attack-surface/skill.md +18 -10
  57. package/skills/ai-c2-detection/skill.md +7 -2
  58. package/skills/ai-risk-management/skill.md +5 -4
  59. package/skills/api-security/skill.md +3 -3
  60. package/skills/attack-surface-pentest/skill.md +5 -5
  61. package/skills/cloud-security/skill.md +1 -1
  62. package/skills/compliance-theater/skill.md +8 -8
  63. package/skills/container-runtime-security/skill.md +1 -1
  64. package/skills/dlp-gap-analysis/skill.md +5 -1
  65. package/skills/email-security-anti-phishing/skill.md +1 -1
  66. package/skills/exploit-scoring/skill.md +18 -18
  67. package/skills/framework-gap-analysis/skill.md +6 -6
  68. package/skills/global-grc/skill.md +3 -2
  69. package/skills/identity-assurance/skill.md +2 -2
  70. package/skills/incident-response-playbook/skill.md +4 -4
  71. package/skills/kernel-lpe-triage/skill.md +21 -2
  72. package/skills/mcp-agent-trust/skill.md +17 -10
  73. package/skills/mlops-security/skill.md +2 -1
  74. package/skills/ot-ics-security/skill.md +1 -1
  75. package/skills/policy-exception-gen/skill.md +3 -3
  76. package/skills/pqc-first/skill.md +1 -1
  77. package/skills/rag-pipeline-security/skill.md +7 -3
  78. package/skills/researcher/skill.md +20 -3
  79. package/skills/sector-energy/skill.md +1 -1
  80. package/skills/sector-federal-government/skill.md +1 -1
  81. package/skills/sector-financial/skill.md +3 -3
  82. package/skills/sector-healthcare/skill.md +2 -2
  83. package/skills/security-maturity-tiers/skill.md +7 -7
  84. package/skills/skill-update-loop/skill.md +19 -3
  85. package/skills/supply-chain-integrity/skill.md +1 -1
  86. package/skills/threat-model-currency/skill.md +11 -11
  87. package/skills/threat-modeling-methodology/skill.md +3 -3
  88. package/skills/webapp-security/skill.md +1 -1
  89. package/skills/zeroday-gap-learn/skill.md +51 -7
  90. package/vendor/blamejs/_PROVENANCE.json +4 -1
  91. package/vendor/blamejs/worker-pool.js +38 -0
@@ -26,136 +26,121 @@
26
26
  "note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
27
27
  }
28
28
  },
29
- "RFC-8446": {
30
- "number": 8446,
31
- "title": "The Transport Layer Security (TLS) Protocol Version 1.3",
29
+ "RFC-4301": {
30
+ "number": 4301,
31
+ "title": "Security Architecture for the Internet Protocol",
32
32
  "status": "Proposed Standard",
33
- "published": "2018-08",
34
- "replaces": [
35
- "RFC-5246"
36
- ],
37
- "errata_count": 39,
38
- "tracker": "https://www.rfc-editor.org/info/rfc8446",
39
- "relevance": "TLS 1.3 is the baseline assumption for every AI provider egress channel, every MCP HTTP transport, and every kernel-userspace TLS exchange. Skills that analyze boundary inspection, cert pinning, or AI-API C2 detection must ground in this RFC.",
40
- "lag_notes": "RFC 8446 alone is not PQC-ready. Hybrid PQC drafts (draft-ietf-tls-ecdhe-mlkem, draft-ietf-tls-hybrid-design) layer on top — see those entries.",
33
+ "published": "2005-12",
34
+ "errata_count": 11,
35
+ "tracker": "https://www.rfc-editor.org/info/rfc4301",
36
+ "relevance": "IPsec architecture. CVE-2026-43284 (Dirty Frag) exploits an implementation bug in the Linux kernel's IPsec ESP path; the spec layer is RFC 4301 + RFC 4303. Framework controls like NIST 800-53 SC-8 implicitly cite this RFC family without operationalizing the kernel-implementation gap.",
41
37
  "skills_referencing": [
42
- "ai-c2-detection",
43
- "api-security",
44
- "cloud-security",
45
- "container-runtime-security",
46
- "dlp-gap-analysis",
47
- "mcp-agent-trust",
48
- "pqc-first",
49
- "sector-federal-government",
50
- "sector-financial",
51
- "webapp-security"
38
+ "kernel-lpe-triage"
52
39
  ],
53
40
  "last_verified": "2026-05-11"
54
41
  },
55
- "DRAFT-IETF-TLS-ECDHE-MLKEM": {
56
- "number": null,
57
- "draft_id": "draft-ietf-tls-ecdhe-mlkem",
58
- "title": "Post-Quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3",
59
- "status": "Draft",
60
- "published": "in flight as of 2026-05",
61
- "tracker": "https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/",
62
- "relevance": "Defines X25519+ML-KEM-768 and similar hybrid groups for TLS 1.3 the operational path for PQC migration without rip-and-replace. Pinned in pqc-first as the recommended hybrid posture.",
63
- "lag_notes": "Still a draft as of mid-2026. OpenSSL 3.5+ ships the hybrid groups under provisional codepoints. Final RFC number TBD on WG consensus.",
42
+ "RFC-4303": {
43
+ "number": 4303,
44
+ "title": "IP Encapsulating Security Payload (ESP)",
45
+ "status": "Proposed Standard",
46
+ "published": "2005-12",
47
+ "errata_count": 7,
48
+ "tracker": "https://www.rfc-editor.org/info/rfc4303",
49
+ "relevance": "ESP the specific IPsec datagram format exploited by Dirty Frag (CVE-2026-43284). Spec compliance does not imply implementation safety; the kernel-lpe-triage skill operationalizes the gap.",
64
50
  "skills_referencing": [
65
- "pqc-first"
51
+ "kernel-lpe-triage"
66
52
  ],
67
53
  "last_verified": "2026-05-11"
68
54
  },
69
- "DRAFT-IETF-TLS-HYBRID-DESIGN": {
70
- "number": null,
71
- "draft_id": "draft-ietf-tls-hybrid-design",
72
- "title": "Hybrid key exchange in TLS 1.3",
73
- "status": "Draft",
74
- "tracker": "https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design/",
75
- "relevance": "General-purpose hybrid-KEM design that the ecdhe-mlkem draft instantiates. Operators evaluating the migration story should read both.",
76
- "lag_notes": "Companion draft. Status synchronized with draft-ietf-tls-ecdhe-mlkem.",
55
+ "RFC-6376": {
56
+ "number": 6376,
57
+ "title": "DomainKeys Identified Mail (DKIM) Signatures",
58
+ "status": "Internet Standard",
59
+ "published": "2011-09",
60
+ "tracker": "https://www.rfc-editor.org/info/rfc6376",
61
+ "relevance": "Cryptographic signing of email by the originating domain. DMARC verification relies on either SPF or DKIM aligning with the From-header domain. Operationally, DKIM is the load-bearing half of DMARC — SPF breaks on legitimate forwarding paths; DKIM survives them. Key-length lag is the recurring framework gap: many deployments still use 1024-bit RSA keys despite IETF guidance to rotate to ≥2048-bit.",
77
62
  "skills_referencing": [
78
- "pqc-first"
63
+ "email-security-anti-phishing"
79
64
  ],
80
- "last_verified": "2026-05-11"
65
+ "last_verified": "2026-05-13"
81
66
  },
82
- "RFC-9180": {
83
- "number": 9180,
84
- "title": "Hybrid Public Key Encryption",
85
- "status": "Informational",
86
- "published": "2022-02",
87
- "errata_count": 12,
88
- "tracker": "https://www.rfc-editor.org/info/rfc9180",
89
- "relevance": "HPKE is the substrate for TLS ECH, MLS, Oblivious HTTP, and several emerging covert-channel scenarios in AI-API C2 detection. PQC composition discussions for HPKE are ongoing at IETF.",
90
- "lag_notes": "RFC 9180 is classical-only. PQC HPKE is being worked at IETF CFRG; expect draft updates through 2026-2027.",
67
+ "RFC-6545": {
68
+ "number": 6545,
69
+ "title": "Real-time Inter-network Defense (RID)",
70
+ "status": "Proposed Standard",
71
+ "published": "2012-04",
72
+ "tracker": "https://www.rfc-editor.org/info/rfc6545",
73
+ "relevance": "Defines the RID schema for exchanging incident-response data between organizations and CSIRTs. Operator-facing relevance is via the IODEF (RFC 7970) payload that RID transports — the pair is the IETF-standardized cross-organizational incident-coordination protocol. Adoption lags; in practice many SOCs use ad-hoc CSV/JSON exchanges instead, leaving compliance with 'documented coordination channel' requirements weakly evidenced.",
91
74
  "skills_referencing": [
92
- "ai-c2-detection",
93
- "cloud-security",
94
- "pqc-first"
75
+ "incident-response-playbook"
95
76
  ],
96
- "last_verified": "2026-05-11"
77
+ "last_verified": "2026-05-13"
97
78
  },
98
- "RFC-9458": {
99
- "number": 9458,
100
- "title": "Oblivious HTTP",
79
+ "RFC-6546": {
80
+ "number": 6546,
81
+ "title": "Transport of Real-time Inter-network Defense (RID) Messages over HTTP/TLS",
101
82
  "status": "Proposed Standard",
102
- "published": "2024-01",
103
- "tracker": "https://www.rfc-editor.org/info/rfc9458",
104
- "relevance": "Oblivious HTTP is a published-standard covert-channel candidate for AI-API C2: requests are encrypted to a relay so the destination sees no client identity. Boundary inspection cannot distinguish OHTTP-wrapped AI traffic from any other HTTPS traffic to the relay endpoint.",
105
- "lag_notes": "Standard published; enterprise SC-7 boundary tooling vendors are 12-18 months behind on detection guidance. AI-c2-detection skill operationalizes the gap.",
83
+ "published": "2012-04",
84
+ "tracker": "https://www.rfc-editor.org/info/rfc6546",
85
+ "relevance": "Specifies the HTTP-over-TLS transport for RID (RFC 6545) messages. Operator-facing: provides the wire-level protocol for IODEF/RID message exchange when an organization commits to standardized incident-data coordination. Pair this with RFC 6545 (schema) and RFC 7970 (IODEF v2 payload).",
106
86
  "skills_referencing": [
107
- "ai-c2-detection",
108
- "dlp-gap-analysis"
87
+ "incident-response-playbook"
109
88
  ],
110
- "last_verified": "2026-05-11"
89
+ "last_verified": "2026-05-13"
111
90
  },
112
- "RFC-9421": {
113
- "number": 9421,
114
- "title": "HTTP Message Signatures",
91
+ "RFC-6749": {
92
+ "number": 6749,
93
+ "title": "The OAuth 2.0 Authorization Framework",
115
94
  "status": "Proposed Standard",
116
- "published": "2024-02",
117
- "tracker": "https://www.rfc-editor.org/info/rfc9421",
118
- "relevance": "Per-request signing of HTTP messages — relevant for MCP server-to-agent attestation and for AI provider abuse-signal subscriptions. AI providers increasingly use HTTP Message Signatures for webhook authenticity.",
119
- "lag_notes": "Standard published; AI-provider adoption is uneven. MCP spec does not yet mandate it.",
95
+ "published": "2012-10",
96
+ "errata_count": 33,
97
+ "tracker": "https://www.rfc-editor.org/info/rfc6749",
98
+ "relevance": "OAuth 2.0 underpins MCP server-to-client auth in production deployments. RFC 9700 (OAuth 2.0 Security BCP) is the operational reference.",
120
99
  "skills_referencing": [
121
- "ai-c2-detection",
122
100
  "api-security",
123
- "mcp-agent-trust",
124
- "sector-financial",
125
- "sector-healthcare"
101
+ "identity-assurance",
102
+ "mcp-agent-trust"
126
103
  ],
127
104
  "last_verified": "2026-05-11"
128
105
  },
129
- "RFC-9114": {
130
- "number": 9114,
131
- "title": "HTTP/3",
106
+ "RFC-7208": {
107
+ "number": 7208,
108
+ "title": "Sender Policy Framework (SPF) for Authorizing Use of Domains in Email",
132
109
  "status": "Proposed Standard",
133
- "published": "2022-06",
134
- "errata_count": 7,
135
- "tracker": "https://www.rfc-editor.org/info/rfc9114",
136
- "relevance": "AI providers increasingly serve over HTTP/3 (QUIC). Boundary tools that rely on TLS termination + HTTP/1.1 / HTTP/2 inspection cannot apply to HTTP/3 without QUIC-aware probes. Detection gap for ai-c2-detection.",
137
- "lag_notes": "Standard well-deployed; enterprise next-gen-firewall HTTP/3 inspection coverage as of mid-2026 remains uneven.",
110
+ "published": "2014-04",
111
+ "tracker": "https://www.rfc-editor.org/info/rfc7208",
112
+ "relevance": "Authorizes which IPs may send mail on behalf of a domain. DMARC's path-based authentication half. Limits: a strict 10-DNS-lookup ceiling that operators routinely blow past through nested includes, leading to permerror DMARC outcomes; SPF breaks across legitimate forwarders, which is why DKIM (RFC 6376) is the load-bearing half operationally.",
138
113
  "skills_referencing": [
139
- "ai-c2-detection",
140
- "api-security",
141
- "mcp-agent-trust",
142
- "webapp-security"
114
+ "email-security-anti-phishing"
143
115
  ],
144
- "last_verified": "2026-05-11"
116
+ "last_verified": "2026-05-13"
145
117
  },
146
- "RFC-9000": {
147
- "number": 9000,
148
- "title": "QUIC: A UDP-Based Multiplexed and Secure Transport",
149
- "status": "Proposed Standard",
150
- "published": "2021-05",
151
- "errata_count": 25,
152
- "tracker": "https://www.rfc-editor.org/info/rfc9000",
153
- "relevance": "QUIC is the transport beneath HTTP/3 and beneath several emerging AI inference APIs that need low-latency streaming. SC-7 boundary tools historically assume TCP for HTTPS — QUIC over UDP requires explicit detection rules.",
118
+ "RFC-7296": {
119
+ "number": 7296,
120
+ "title": "Internet Key Exchange Protocol Version 2 (IKEv2)",
121
+ "status": "Internet Standard",
122
+ "published": "2014-10",
123
+ "std_number": 79,
124
+ "errata_count": 19,
125
+ "tracker": "https://www.rfc-editor.org/info/rfc7296",
126
+ "relevance": "IKEv2 sets up IPsec SAs. Configuration mistakes here surface as SI-7 / SC-8 audit findings without indicating the kernel-side implementation reality. Referenced by kernel-lpe-triage when scoping the Dirty Frag blast radius.",
154
127
  "skills_referencing": [
155
- "ai-c2-detection"
128
+ "kernel-lpe-triage"
156
129
  ],
157
130
  "last_verified": "2026-05-11"
158
131
  },
132
+ "RFC-7489": {
133
+ "number": 7489,
134
+ "title": "Domain-based Message Authentication, Reporting, and Conformance (DMARC)",
135
+ "status": "Informational",
136
+ "published": "2015-03",
137
+ "tracker": "https://www.rfc-editor.org/info/rfc7489",
138
+ "relevance": "Defines DMARC — the email-authentication policy framework that binds SPF + DKIM results to a published domain-owner policy. Operator-facing email security depends on a published DMARC record with `p=reject` or `p=quarantine`; relaxed policies (`p=none`) are equivalent to no DMARC for spoofing-defense purposes. Cited alongside DKIM (RFC 6376) and SPF (RFC 7208) as the authoritative tri-RFC for anti-spoofing posture.",
139
+ "skills_referencing": [
140
+ "email-security-anti-phishing"
141
+ ],
142
+ "last_verified": "2026-05-13"
143
+ },
159
144
  "RFC-7519": {
160
145
  "number": 7519,
161
146
  "title": "JSON Web Token (JWT)",
@@ -176,69 +161,114 @@
176
161
  ],
177
162
  "last_verified": "2026-05-11"
178
163
  },
179
- "RFC-8725": {
180
- "number": 8725,
181
- "title": "JSON Web Token Best Current Practices",
182
- "status": "Best Current Practice",
183
- "published": "2020-02",
184
- "errata_count": 4,
185
- "tracker": "https://www.rfc-editor.org/info/rfc8725",
186
- "relevance": "BCP 225. Required reading for any MCP / agent / AI-API auth implementation. Covers algorithm-confusion attacks, kid traversal, audience pinning. mcp-agent-trust uses this as the JWT-handling baseline.",
164
+ "RFC-7970": {
165
+ "number": 7970,
166
+ "title": "The Incident Object Description Exchange Format Version 2",
167
+ "status": "Proposed Standard",
168
+ "published": "2016-11",
169
+ "tracker": "https://www.rfc-editor.org/info/rfc7970",
170
+ "relevance": "IODEF v2 — the structured-incident payload format carried by RID. Operator-facing: IODEF v2 is the canonical machine-readable incident record. Use cases include cross-CSIRT coordination, regulator submissions where structured data is requested, and SIEM-to-SIEM federation. Adoption is sector-uneven; healthcare and financial sectors have stronger uptake than general industry.",
171
+ "skills_referencing": [
172
+ "incident-response-playbook"
173
+ ],
174
+ "last_verified": "2026-05-13"
175
+ },
176
+ "RFC-8032": {
177
+ "number": 8032,
178
+ "title": "Edwards-Curve Digital Signature Algorithm (EdDSA)",
179
+ "status": "Informational",
180
+ "published": "2017-01",
181
+ "errata_count": 8,
182
+ "tracker": "https://www.rfc-editor.org/info/rfc8032",
183
+ "relevance": "Ed25519 / Ed448. exceptd itself uses Ed25519 for skill integrity signing (AGENTS.md hard rule #13, lib/sign.js). Not PQC-safe; pqc-first tracks the SLH-DSA / ML-DSA migration path for signature surfaces.",
184
+ "skills_referencing": [
185
+ "container-runtime-security",
186
+ "identity-assurance",
187
+ "mlops-security",
188
+ "pqc-first",
189
+ "sector-federal-government",
190
+ "supply-chain-integrity"
191
+ ],
192
+ "last_verified": "2026-05-11"
193
+ },
194
+ "RFC-8446": {
195
+ "number": 8446,
196
+ "title": "The Transport Layer Security (TLS) Protocol Version 1.3",
197
+ "status": "Proposed Standard",
198
+ "published": "2018-08",
199
+ "replaces": [
200
+ "RFC-5246"
201
+ ],
202
+ "errata_count": 39,
203
+ "tracker": "https://www.rfc-editor.org/info/rfc8446",
204
+ "relevance": "TLS 1.3 is the baseline assumption for every AI provider egress channel, every MCP HTTP transport, and every kernel-userspace TLS exchange. Skills that analyze boundary inspection, cert pinning, or AI-API C2 detection must ground in this RFC.",
205
+ "lag_notes": "RFC 8446 alone is not PQC-ready. Hybrid PQC drafts (draft-ietf-tls-ecdhe-mlkem, draft-ietf-tls-hybrid-design) layer on top — see those entries.",
187
206
  "skills_referencing": [
207
+ "ai-c2-detection",
188
208
  "api-security",
189
209
  "cloud-security",
190
- "identity-assurance",
210
+ "container-runtime-security",
211
+ "dlp-gap-analysis",
191
212
  "mcp-agent-trust",
213
+ "pqc-first",
214
+ "sector-federal-government",
192
215
  "sector-financial",
193
216
  "webapp-security"
194
217
  ],
195
218
  "last_verified": "2026-05-11"
196
219
  },
197
- "RFC-6749": {
198
- "number": 6749,
199
- "title": "The OAuth 2.0 Authorization Framework",
220
+ "RFC-8461": {
221
+ "number": 8461,
222
+ "title": "SMTP MTA Strict Transport Security (MTA-STS)",
200
223
  "status": "Proposed Standard",
201
- "published": "2012-10",
202
- "errata_count": 33,
203
- "tracker": "https://www.rfc-editor.org/info/rfc6749",
204
- "relevance": "OAuth 2.0 underpins MCP server-to-client auth in production deployments. RFC 9700 (OAuth 2.0 Security BCP) is the operational reference.",
224
+ "published": "2018-09",
225
+ "tracker": "https://www.rfc-editor.org/info/rfc8461",
226
+ "relevance": "Forces TLS on inbound SMTP between MTAs that publish a `_mta-sts` policy. Closes the historical 'opportunistic-TLS-downgrade' attack window where a network-positioned attacker stripped the STARTTLS handshake. Operator-facing: an MTA-STS policy in `enforce` mode plus monitoring via TLSRPT (RFC 8460) is the baseline for inbound email confidentiality. Phishing-defense relevance is indirect — STARTTLS stripping enables session-layer manipulation that downstream defenses (DMARC, content classifiers) cannot recover from.",
205
227
  "skills_referencing": [
206
- "api-security",
207
- "identity-assurance",
208
- "mcp-agent-trust"
228
+ "email-security-anti-phishing"
209
229
  ],
210
- "last_verified": "2026-05-11"
230
+ "last_verified": "2026-05-13"
211
231
  },
212
- "RFC-9700": {
213
- "number": 9700,
214
- "title": "Best Current Practice for OAuth 2.0 Security",
232
+ "RFC-8616": {
233
+ "number": 8616,
234
+ "title": "Email Authentication for Internationalized Mail",
235
+ "status": "Proposed Standard",
236
+ "published": "2019-06",
237
+ "tracker": "https://www.rfc-editor.org/info/rfc8616",
238
+ "relevance": "Updates DKIM / SPF / DMARC handling for internationalized domain names (IDN) and internationalized email-address local parts. Operator-facing: phishing campaigns increasingly leverage IDN homoglyphs (e.g. Cyrillic `а` for Latin `a`), and a DMARC implementation that doesn't honor RFC 8616 normalization rules can fail to align IDN-bearing From-headers correctly. Treat as a compatibility prerequisite for any anti-spoofing posture covering global mail flows.",
239
+ "skills_referencing": [
240
+ "email-security-anti-phishing"
241
+ ],
242
+ "last_verified": "2026-05-13"
243
+ },
244
+ "RFC-8725": {
245
+ "number": 8725,
246
+ "title": "JSON Web Token Best Current Practices",
215
247
  "status": "Best Current Practice",
216
- "published": "2025-01",
217
- "tracker": "https://www.rfc-editor.org/info/rfc9700",
218
- "relevance": "Replaces the older RFC 6819 threat model. MCP / agent OAuth implementations should track this BCP, not the original RFC 6749 alone.",
219
- "lag_notes": "Published 2025-01. Enterprise IAM tooling is still catching up.",
248
+ "published": "2020-02",
249
+ "errata_count": 4,
250
+ "tracker": "https://www.rfc-editor.org/info/rfc8725",
251
+ "relevance": "BCP 225. Required reading for any MCP / agent / AI-API auth implementation. Covers algorithm-confusion attacks, kid traversal, audience pinning. mcp-agent-trust uses this as the JWT-handling baseline.",
220
252
  "skills_referencing": [
221
253
  "api-security",
254
+ "cloud-security",
222
255
  "identity-assurance",
223
- "mcp-agent-trust"
256
+ "mcp-agent-trust",
257
+ "sector-financial",
258
+ "webapp-security"
224
259
  ],
225
260
  "last_verified": "2026-05-11"
226
261
  },
227
- "RFC-8032": {
228
- "number": 8032,
229
- "title": "Edwards-Curve Digital Signature Algorithm (EdDSA)",
230
- "status": "Informational",
231
- "published": "2017-01",
232
- "errata_count": 8,
233
- "tracker": "https://www.rfc-editor.org/info/rfc8032",
234
- "relevance": "Ed25519 / Ed448. exceptd itself uses Ed25519 for skill integrity signing (AGENTS.md hard rule #13, lib/sign.js). Not PQC-safe; pqc-first tracks the SLH-DSA / ML-DSA migration path for signature surfaces.",
262
+ "RFC-9000": {
263
+ "number": 9000,
264
+ "title": "QUIC: A UDP-Based Multiplexed and Secure Transport",
265
+ "status": "Proposed Standard",
266
+ "published": "2021-05",
267
+ "errata_count": 25,
268
+ "tracker": "https://www.rfc-editor.org/info/rfc9000",
269
+ "relevance": "QUIC is the transport beneath HTTP/3 and beneath several emerging AI inference APIs that need low-latency streaming. SC-7 boundary tools historically assume TCP for HTTPS QUIC over UDP requires explicit detection rules.",
235
270
  "skills_referencing": [
236
- "container-runtime-security",
237
- "identity-assurance",
238
- "mlops-security",
239
- "pqc-first",
240
- "sector-federal-government",
241
- "supply-chain-integrity"
271
+ "ai-c2-detection"
242
272
  ],
243
273
  "last_verified": "2026-05-11"
244
274
  },
@@ -255,43 +285,48 @@
255
285
  ],
256
286
  "last_verified": "2026-05-11"
257
287
  },
258
- "RFC-4301": {
259
- "number": 4301,
260
- "title": "Security Architecture for the Internet Protocol",
288
+ "RFC-9114": {
289
+ "number": 9114,
290
+ "title": "HTTP/3",
261
291
  "status": "Proposed Standard",
262
- "published": "2005-12",
263
- "errata_count": 11,
264
- "tracker": "https://www.rfc-editor.org/info/rfc4301",
265
- "relevance": "IPsec architecture. CVE-2026-43284 (Dirty Frag) exploits an implementation bug in the Linux kernel's IPsec ESP path; the spec layer is RFC 4301 + RFC 4303. Framework controls like NIST 800-53 SC-8 implicitly cite this RFC family without operationalizing the kernel-implementation gap.",
292
+ "published": "2022-06",
293
+ "errata_count": 7,
294
+ "tracker": "https://www.rfc-editor.org/info/rfc9114",
295
+ "relevance": "AI providers increasingly serve over HTTP/3 (QUIC). Boundary tools that rely on TLS termination + HTTP/1.1 / HTTP/2 inspection cannot apply to HTTP/3 without QUIC-aware probes. Detection gap for ai-c2-detection.",
296
+ "lag_notes": "Standard well-deployed; enterprise next-gen-firewall HTTP/3 inspection coverage as of mid-2026 remains uneven.",
266
297
  "skills_referencing": [
267
- "kernel-lpe-triage"
298
+ "ai-c2-detection",
299
+ "api-security",
300
+ "mcp-agent-trust",
301
+ "webapp-security"
268
302
  ],
269
303
  "last_verified": "2026-05-11"
270
304
  },
271
- "RFC-4303": {
272
- "number": 4303,
273
- "title": "IP Encapsulating Security Payload (ESP)",
305
+ "RFC-9116": {
306
+ "number": 9116,
307
+ "title": "A File Format to Aid in Security Vulnerability Disclosure",
274
308
  "status": "Proposed Standard",
275
- "published": "2005-12",
276
- "errata_count": 7,
277
- "tracker": "https://www.rfc-editor.org/info/rfc4303",
278
- "relevance": "ESP — the specific IPsec datagram format exploited by Dirty Frag (CVE-2026-43284). Spec compliance does not imply implementation safety; the kernel-lpe-triage skill operationalizes the gap.",
309
+ "published": "2022-04",
310
+ "tracker": "https://www.rfc-editor.org/info/rfc9116",
311
+ "relevance": "Defines the `/.well-known/security.txt` file format. Operator-facing CVD entry point: researchers reaching a domain consult `/.well-known/security.txt` for the disclosure contact + policy URL + preferred encryption + acknowledgments page. Absence is a recurring CVD-friction finding; presence with a stale `Expires` header is equivalent to absence. Pair with ISO 29147 receipt requirements.",
279
312
  "skills_referencing": [
280
- "kernel-lpe-triage"
313
+ "coordinated-vuln-disclosure"
281
314
  ],
282
- "last_verified": "2026-05-11"
315
+ "last_verified": "2026-05-13"
283
316
  },
284
- "RFC-7296": {
285
- "number": 7296,
286
- "title": "Internet Key Exchange Protocol Version 2 (IKEv2)",
287
- "status": "Internet Standard",
288
- "published": "2014-10",
289
- "std_number": 79,
290
- "errata_count": 19,
291
- "tracker": "https://www.rfc-editor.org/info/rfc7296",
292
- "relevance": "IKEv2 sets up IPsec SAs. Configuration mistakes here surface as SI-7 / SC-8 audit findings without indicating the kernel-side implementation reality. Referenced by kernel-lpe-triage when scoping the Dirty Frag blast radius.",
317
+ "RFC-9180": {
318
+ "number": 9180,
319
+ "title": "Hybrid Public Key Encryption",
320
+ "status": "Informational",
321
+ "published": "2022-02",
322
+ "errata_count": 12,
323
+ "tracker": "https://www.rfc-editor.org/info/rfc9180",
324
+ "relevance": "HPKE is the substrate for TLS ECH, MLS, Oblivious HTTP, and several emerging covert-channel scenarios in AI-API C2 detection. PQC composition discussions for HPKE are ongoing at IETF.",
325
+ "lag_notes": "RFC 9180 is classical-only. PQC HPKE is being worked at IETF CFRG; expect draft updates through 2026-2027.",
293
326
  "skills_referencing": [
294
- "kernel-lpe-triage"
327
+ "ai-c2-detection",
328
+ "cloud-security",
329
+ "pqc-first"
295
330
  ],
296
331
  "last_verified": "2026-05-11"
297
332
  },
@@ -309,6 +344,52 @@
309
344
  ],
310
345
  "last_verified": "2026-05-11"
311
346
  },
347
+ "RFC-9421": {
348
+ "number": 9421,
349
+ "title": "HTTP Message Signatures",
350
+ "status": "Proposed Standard",
351
+ "published": "2024-02",
352
+ "tracker": "https://www.rfc-editor.org/info/rfc9421",
353
+ "relevance": "Per-request signing of HTTP messages — relevant for MCP server-to-agent attestation and for AI provider abuse-signal subscriptions. AI providers increasingly use HTTP Message Signatures for webhook authenticity.",
354
+ "lag_notes": "Standard published; AI-provider adoption is uneven. MCP spec does not yet mandate it.",
355
+ "skills_referencing": [
356
+ "ai-c2-detection",
357
+ "api-security",
358
+ "mcp-agent-trust",
359
+ "sector-financial",
360
+ "sector-healthcare"
361
+ ],
362
+ "last_verified": "2026-05-11"
363
+ },
364
+ "RFC-9458": {
365
+ "number": 9458,
366
+ "title": "Oblivious HTTP",
367
+ "status": "Proposed Standard",
368
+ "published": "2024-01",
369
+ "tracker": "https://www.rfc-editor.org/info/rfc9458",
370
+ "relevance": "Oblivious HTTP is a published-standard covert-channel candidate for AI-API C2: requests are encrypted to a relay so the destination sees no client identity. Boundary inspection cannot distinguish OHTTP-wrapped AI traffic from any other HTTPS traffic to the relay endpoint.",
371
+ "lag_notes": "Standard published; enterprise SC-7 boundary tooling vendors are 12-18 months behind on detection guidance. AI-c2-detection skill operationalizes the gap.",
372
+ "skills_referencing": [
373
+ "ai-c2-detection",
374
+ "dlp-gap-analysis"
375
+ ],
376
+ "last_verified": "2026-05-11"
377
+ },
378
+ "RFC-9700": {
379
+ "number": 9700,
380
+ "title": "Best Current Practice for OAuth 2.0 Security",
381
+ "status": "Best Current Practice",
382
+ "published": "2025-01",
383
+ "tracker": "https://www.rfc-editor.org/info/rfc9700",
384
+ "relevance": "Replaces the older RFC 6819 threat model. MCP / agent OAuth implementations should track this BCP, not the original RFC 6749 alone.",
385
+ "lag_notes": "Published 2025-01. Enterprise IAM tooling is still catching up.",
386
+ "skills_referencing": [
387
+ "api-security",
388
+ "identity-assurance",
389
+ "mcp-agent-trust"
390
+ ],
391
+ "last_verified": "2026-05-11"
392
+ },
312
393
  "RFC-9794": {
313
394
  "number": 9794,
314
395
  "title": "Terminology for Post-Quantum Cryptography",
@@ -321,65 +402,44 @@
321
402
  ],
322
403
  "last_verified": "2026-05-11"
323
404
  },
324
- "RFC-7489": {
325
- "number": 7489,
326
- "title": "Domain-based Message Authentication, Reporting, and Conformance (DMARC)",
327
- "status": "Informational",
328
- "published": "2015-03",
329
- "tracker": "https://www.rfc-editor.org/info/rfc7489",
330
- "relevance": "Defines DMARC the email-authentication policy framework that binds SPF + DKIM results to a published domain-owner policy. Operator-facing email security depends on a published DMARC record with `p=reject` or `p=quarantine`; relaxed policies (`p=none`) are equivalent to no DMARC for spoofing-defense purposes. Cited alongside DKIM (RFC 6376) and SPF (RFC 7208) as the authoritative tri-RFC for anti-spoofing posture.",
331
- "skills_referencing": [
332
- "email-security-anti-phishing"
333
- ],
334
- "last_verified": "2026-05-13"
335
- },
336
- "RFC-6376": {
337
- "number": 6376,
338
- "title": "DomainKeys Identified Mail (DKIM) Signatures",
339
- "status": "Internet Standard",
340
- "published": "2011-09",
341
- "tracker": "https://www.rfc-editor.org/info/rfc6376",
342
- "relevance": "Cryptographic signing of email by the originating domain. DMARC verification relies on either SPF or DKIM aligning with the From-header domain. Operationally, DKIM is the load-bearing half of DMARC — SPF breaks on legitimate forwarding paths; DKIM survives them. Key-length lag is the recurring framework gap: many deployments still use 1024-bit RSA keys despite IETF guidance to rotate to ≥2048-bit.",
343
- "skills_referencing": [
344
- "email-security-anti-phishing"
345
- ],
346
- "last_verified": "2026-05-13"
347
- },
348
- "RFC-7208": {
349
- "number": 7208,
350
- "title": "Sender Policy Framework (SPF) for Authorizing Use of Domains in Email",
351
- "status": "Proposed Standard",
352
- "published": "2014-04",
353
- "tracker": "https://www.rfc-editor.org/info/rfc7208",
354
- "relevance": "Authorizes which IPs may send mail on behalf of a domain. DMARC's path-based authentication half. Limits: a strict 10-DNS-lookup ceiling that operators routinely blow past through nested includes, leading to permerror DMARC outcomes; SPF breaks across legitimate forwarders, which is why DKIM (RFC 6376) is the load-bearing half operationally.",
405
+ "CSAF-2.0": {
406
+ "number": null,
407
+ "title": "OASIS Common Security Advisory Framework Version 2.0",
408
+ "status": "OASIS Standard",
409
+ "published": "2022-11",
410
+ "tracker": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf-v2.0.html",
411
+ "relevance": "Machine-readable security advisory format adopted by EU CRA, CISA, and major vendor PSIRTs. Replaces the CVRF-1.2 format. Operator-facing: CSAF 2.0 documents carry the same advisory content traditionally found in vendor PDFs but in a parseable JSON form that consumers can ingest for fleet-wide impact assessment. exceptd emits CSAF-2.0 close.evidence_package bundles from `exceptd run --format csaf-2.0` for downstream auditor consumption.",
355
412
  "skills_referencing": [
356
- "email-security-anti-phishing"
413
+ "coordinated-vuln-disclosure"
357
414
  ],
358
415
  "last_verified": "2026-05-13"
359
416
  },
360
- "RFC-8616": {
361
- "number": 8616,
362
- "title": "Email Authentication for Internationalized Mail",
363
- "status": "Proposed Standard",
364
- "published": "2019-06",
365
- "tracker": "https://www.rfc-editor.org/info/rfc8616",
366
- "relevance": "Updates DKIM / SPF / DMARC handling for internationalized domain names (IDN) and internationalized email-address local parts. Operator-facing: phishing campaigns increasingly leverage IDN homoglyphs (e.g. Cyrillic `а` for Latin `a`), and a DMARC implementation that doesn't honor RFC 8616 normalization rules can fail to align IDN-bearing From-headers correctly. Treat as a compatibility prerequisite for any anti-spoofing posture covering global mail flows.",
417
+ "DRAFT-IETF-TLS-ECDHE-MLKEM": {
418
+ "number": null,
419
+ "draft_id": "draft-ietf-tls-ecdhe-mlkem",
420
+ "title": "Post-Quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3",
421
+ "status": "Draft",
422
+ "published": "in flight as of 2026-05",
423
+ "tracker": "https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/",
424
+ "relevance": "Defines X25519+ML-KEM-768 and similar hybrid groups for TLS 1.3 — the operational path for PQC migration without rip-and-replace. Pinned in pqc-first as the recommended hybrid posture.",
425
+ "lag_notes": "Still a draft as of mid-2026. OpenSSL 3.5+ ships the hybrid groups under provisional codepoints. Final RFC number TBD on WG consensus.",
367
426
  "skills_referencing": [
368
- "email-security-anti-phishing"
427
+ "pqc-first"
369
428
  ],
370
- "last_verified": "2026-05-13"
429
+ "last_verified": "2026-05-11"
371
430
  },
372
- "RFC-8461": {
373
- "number": 8461,
374
- "title": "SMTP MTA Strict Transport Security (MTA-STS)",
375
- "status": "Proposed Standard",
376
- "published": "2018-09",
377
- "tracker": "https://www.rfc-editor.org/info/rfc8461",
378
- "relevance": "Forces TLS on inbound SMTP between MTAs that publish a `_mta-sts` policy. Closes the historical 'opportunistic-TLS-downgrade' attack window where a network-positioned attacker stripped the STARTTLS handshake. Operator-facing: an MTA-STS policy in `enforce` mode plus monitoring via TLSRPT (RFC 8460) is the baseline for inbound email confidentiality. Phishing-defense relevance is indirect — STARTTLS stripping enables session-layer manipulation that downstream defenses (DMARC, content classifiers) cannot recover from.",
431
+ "DRAFT-IETF-TLS-HYBRID-DESIGN": {
432
+ "number": null,
433
+ "draft_id": "draft-ietf-tls-hybrid-design",
434
+ "title": "Hybrid key exchange in TLS 1.3",
435
+ "status": "Draft",
436
+ "tracker": "https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design/",
437
+ "relevance": "General-purpose hybrid-KEM design that the ecdhe-mlkem draft instantiates. Operators evaluating the migration story should read both.",
438
+ "lag_notes": "Companion draft. Status synchronized with draft-ietf-tls-ecdhe-mlkem.",
379
439
  "skills_referencing": [
380
- "email-security-anti-phishing"
440
+ "pqc-first"
381
441
  ],
382
- "last_verified": "2026-05-13"
442
+ "last_verified": "2026-05-11"
383
443
  },
384
444
  "ISO-29147": {
385
445
  "number": null,
@@ -404,65 +464,5 @@
404
464
  "coordinated-vuln-disclosure"
405
465
  ],
406
466
  "last_verified": "2026-05-13"
407
- },
408
- "RFC-9116": {
409
- "number": 9116,
410
- "title": "A File Format to Aid in Security Vulnerability Disclosure",
411
- "status": "Proposed Standard",
412
- "published": "2022-04",
413
- "tracker": "https://www.rfc-editor.org/info/rfc9116",
414
- "relevance": "Defines the `/.well-known/security.txt` file format. Operator-facing CVD entry point: researchers reaching a domain consult `/.well-known/security.txt` for the disclosure contact + policy URL + preferred encryption + acknowledgments page. Absence is a recurring CVD-friction finding; presence with a stale `Expires` header is equivalent to absence. Pair with ISO 29147 receipt requirements.",
415
- "skills_referencing": [
416
- "coordinated-vuln-disclosure"
417
- ],
418
- "last_verified": "2026-05-13"
419
- },
420
- "CSAF-2.0": {
421
- "number": null,
422
- "title": "OASIS Common Security Advisory Framework Version 2.0",
423
- "status": "OASIS Standard",
424
- "published": "2022-11",
425
- "tracker": "https://docs.oasis-open.org/csaf/csaf/v2.0/csaf-v2.0.html",
426
- "relevance": "Machine-readable security advisory format adopted by EU CRA, CISA, and major vendor PSIRTs. Replaces the CVRF-1.2 format. Operator-facing: CSAF 2.0 documents carry the same advisory content traditionally found in vendor PDFs but in a parseable JSON form that consumers can ingest for fleet-wide impact assessment. exceptd emits CSAF-2.0 close.evidence_package bundles from `exceptd run --format csaf-2.0` for downstream auditor consumption.",
427
- "skills_referencing": [
428
- "coordinated-vuln-disclosure"
429
- ],
430
- "last_verified": "2026-05-13"
431
- },
432
- "RFC-6545": {
433
- "number": 6545,
434
- "title": "Real-time Inter-network Defense (RID)",
435
- "status": "Proposed Standard",
436
- "published": "2012-04",
437
- "tracker": "https://www.rfc-editor.org/info/rfc6545",
438
- "relevance": "Defines the RID schema for exchanging incident-response data between organizations and CSIRTs. Operator-facing relevance is via the IODEF (RFC 7970) payload that RID transports — the pair is the IETF-standardized cross-organizational incident-coordination protocol. Adoption lags; in practice many SOCs use ad-hoc CSV/JSON exchanges instead, leaving compliance with 'documented coordination channel' requirements weakly evidenced.",
439
- "skills_referencing": [
440
- "incident-response-playbook"
441
- ],
442
- "last_verified": "2026-05-13"
443
- },
444
- "RFC-6546": {
445
- "number": 6546,
446
- "title": "Transport of Real-time Inter-network Defense (RID) Messages over HTTP/TLS",
447
- "status": "Proposed Standard",
448
- "published": "2012-04",
449
- "tracker": "https://www.rfc-editor.org/info/rfc6546",
450
- "relevance": "Specifies the HTTP-over-TLS transport for RID (RFC 6545) messages. Operator-facing: provides the wire-level protocol for IODEF/RID message exchange when an organization commits to standardized incident-data coordination. Pair this with RFC 6545 (schema) and RFC 7970 (IODEF v2 payload).",
451
- "skills_referencing": [
452
- "incident-response-playbook"
453
- ],
454
- "last_verified": "2026-05-13"
455
- },
456
- "RFC-7970": {
457
- "number": 7970,
458
- "title": "The Incident Object Description Exchange Format Version 2",
459
- "status": "Proposed Standard",
460
- "published": "2016-11",
461
- "tracker": "https://www.rfc-editor.org/info/rfc7970",
462
- "relevance": "IODEF v2 — the structured-incident payload format carried by RID. Operator-facing: IODEF v2 is the canonical machine-readable incident record. Use cases include cross-CSIRT coordination, regulator submissions where structured data is requested, and SIEM-to-SIEM federation. Adoption is sector-uneven; healthcare and financial sectors have stronger uptake than general industry.",
463
- "skills_referencing": [
464
- "incident-response-playbook"
465
- ],
466
- "last_verified": "2026-05-13"
467
467
  }
468
468
  }