@blamejs/exceptd-skills 0.12.13 → 0.12.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +150 -0
- package/bin/exceptd.js +147 -9
- package/data/_indexes/_meta.json +45 -45
- package/data/_indexes/activity-feed.json +4 -4
- package/data/_indexes/catalog-summaries.json +29 -29
- package/data/_indexes/chains.json +3238 -3210
- package/data/_indexes/frequency.json +3 -0
- package/data/_indexes/jurisdiction-map.json +5 -3
- package/data/_indexes/section-offsets.json +712 -685
- package/data/_indexes/theater-fingerprints.json +1 -1
- package/data/_indexes/token-budget.json +355 -340
- package/data/atlas-ttps.json +144 -129
- package/data/attack-techniques.json +319 -76
- package/data/cve-catalog.json +515 -475
- package/data/cwe-catalog.json +1081 -759
- package/data/exploit-availability.json +63 -15
- package/data/framework-control-gaps.json +867 -843
- package/data/rfc-references.json +276 -276
- package/keys/EXPECTED_FINGERPRINT +1 -0
- package/lib/auto-discovery.js +21 -4
- package/lib/cross-ref-api.js +39 -6
- package/lib/cve-curation.js +18 -5
- package/lib/lint-skills.js +6 -1
- package/lib/playbook-runner.js +742 -78
- package/lib/refresh-external.js +40 -22
- package/lib/refresh-network.js +193 -17
- package/lib/scoring.js +20 -7
- package/lib/source-ghsa.js +219 -37
- package/lib/source-osv.js +381 -122
- package/lib/validate-catalog-meta.js +64 -9
- package/lib/validate-cve-catalog.js +56 -18
- package/lib/validate-indexes.js +88 -37
- package/lib/verify.js +72 -0
- package/manifest-snapshot.json +1 -1
- package/manifest-snapshot.sha256 +1 -0
- package/manifest.json +73 -73
- package/orchestrator/dispatcher.js +21 -1
- package/orchestrator/event-bus.js +52 -8
- package/orchestrator/index.js +279 -20
- package/orchestrator/pipeline.js +63 -2
- package/orchestrator/scanner.js +32 -10
- package/orchestrator/scheduler.js +150 -17
- package/package.json +3 -1
- package/sbom.cdx.json +7 -7
- package/scripts/check-manifest-snapshot.js +32 -0
- package/scripts/check-sbom-currency.js +65 -3
- package/scripts/check-test-coverage.js +142 -19
- package/scripts/predeploy.js +83 -39
- package/scripts/refresh-manifest-snapshot.js +55 -4
- package/scripts/validate-vendor-online.js +169 -0
- package/scripts/verify-shipped-tarball.js +106 -3
- package/skills/ai-attack-surface/skill.md +18 -10
- package/skills/ai-c2-detection/skill.md +7 -2
- package/skills/ai-risk-management/skill.md +5 -4
- package/skills/api-security/skill.md +3 -3
- package/skills/attack-surface-pentest/skill.md +5 -5
- package/skills/cloud-security/skill.md +1 -1
- package/skills/compliance-theater/skill.md +8 -8
- package/skills/container-runtime-security/skill.md +1 -1
- package/skills/dlp-gap-analysis/skill.md +5 -1
- package/skills/email-security-anti-phishing/skill.md +1 -1
- package/skills/exploit-scoring/skill.md +18 -18
- package/skills/framework-gap-analysis/skill.md +6 -6
- package/skills/global-grc/skill.md +3 -2
- package/skills/identity-assurance/skill.md +2 -2
- package/skills/incident-response-playbook/skill.md +4 -4
- package/skills/kernel-lpe-triage/skill.md +21 -2
- package/skills/mcp-agent-trust/skill.md +17 -10
- package/skills/mlops-security/skill.md +2 -1
- package/skills/ot-ics-security/skill.md +1 -1
- package/skills/policy-exception-gen/skill.md +3 -3
- package/skills/pqc-first/skill.md +1 -1
- package/skills/rag-pipeline-security/skill.md +7 -3
- package/skills/researcher/skill.md +20 -3
- package/skills/sector-energy/skill.md +1 -1
- package/skills/sector-federal-government/skill.md +1 -1
- package/skills/sector-financial/skill.md +3 -3
- package/skills/sector-healthcare/skill.md +2 -2
- package/skills/security-maturity-tiers/skill.md +7 -7
- package/skills/skill-update-loop/skill.md +19 -3
- package/skills/supply-chain-integrity/skill.md +1 -1
- package/skills/threat-model-currency/skill.md +11 -11
- package/skills/threat-modeling-methodology/skill.md +3 -3
- package/skills/webapp-security/skill.md +1 -1
- package/skills/zeroday-gap-learn/skill.md +51 -7
- package/vendor/blamejs/_PROVENANCE.json +4 -1
- package/vendor/blamejs/worker-pool.js +38 -0
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
"_meta": {
|
|
3
3
|
"schema_version": "1.0.0",
|
|
4
4
|
"last_updated": "2026-05-13",
|
|
5
|
-
"attack_version": "
|
|
5
|
+
"attack_version": "17",
|
|
6
6
|
"attack_version_date": "2025-06-25",
|
|
7
7
|
"source": "https://attack.mitre.org — MITRE ATT&CK Enterprise + ICS. Only techniques currently referenced by shipped exceptd skills and playbooks. The full ATT&CK matrix (~700 techniques) is intentionally not duplicated here; this is a resolution catalog for cross-reference validation, not a substitute for attack.mitre.org. See `npm run refresh-attack-techniques` (v0.13.0+) for the full corpus.",
|
|
8
8
|
"tlp": "CLEAR",
|
|
@@ -18,79 +18,322 @@
|
|
|
18
18
|
"note": "Catalog must be rebuilt against the upstream ATT&CK release whenever MITRE publishes a new version. AGENTS.md hard rule #8 requires the bump to be intentional, not silent."
|
|
19
19
|
}
|
|
20
20
|
},
|
|
21
|
-
"T0001": {
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
"
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
"
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
"
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
"
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
"
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
"
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
"
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
"
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
"
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
"
|
|
63
|
-
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
"
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
"
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
"
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
"
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
"
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
"
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
"
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
"
|
|
95
|
-
|
|
21
|
+
"T0001": {
|
|
22
|
+
"name": "Authority Spoof",
|
|
23
|
+
"version": "v17"
|
|
24
|
+
},
|
|
25
|
+
"T0017": {
|
|
26
|
+
"name": "Spearphishing Attachment (ICS)",
|
|
27
|
+
"version": "v17"
|
|
28
|
+
},
|
|
29
|
+
"T0051": {
|
|
30
|
+
"name": "Position Tampering",
|
|
31
|
+
"version": "v17"
|
|
32
|
+
},
|
|
33
|
+
"T0096": {
|
|
34
|
+
"name": "Remote System Discovery (ICS)",
|
|
35
|
+
"version": "v17"
|
|
36
|
+
},
|
|
37
|
+
"T0853": {
|
|
38
|
+
"name": "Scripting",
|
|
39
|
+
"version": "v17"
|
|
40
|
+
},
|
|
41
|
+
"T0855": {
|
|
42
|
+
"name": "Unauthorized Command Message",
|
|
43
|
+
"version": "v17"
|
|
44
|
+
},
|
|
45
|
+
"T0867": {
|
|
46
|
+
"name": "Lateral Tool Transfer",
|
|
47
|
+
"version": "v17",
|
|
48
|
+
"domain": "ICS"
|
|
49
|
+
},
|
|
50
|
+
"T0883": {
|
|
51
|
+
"name": "Internet Accessible Device",
|
|
52
|
+
"version": "v17"
|
|
53
|
+
},
|
|
54
|
+
"T1021": {
|
|
55
|
+
"name": "Remote Services",
|
|
56
|
+
"version": "v17"
|
|
57
|
+
},
|
|
58
|
+
"T1027": {
|
|
59
|
+
"name": "Obfuscated Files or Information",
|
|
60
|
+
"version": "v17"
|
|
61
|
+
},
|
|
62
|
+
"T1040": {
|
|
63
|
+
"name": "Network Sniffing",
|
|
64
|
+
"version": "v17"
|
|
65
|
+
},
|
|
66
|
+
"T1041": {
|
|
67
|
+
"name": "Exfiltration Over C2 Channel",
|
|
68
|
+
"version": "v17"
|
|
69
|
+
},
|
|
70
|
+
"T1053.003": {
|
|
71
|
+
"name": "Scheduled Task/Job: Cron",
|
|
72
|
+
"version": "v17"
|
|
73
|
+
},
|
|
74
|
+
"T1055": {
|
|
75
|
+
"name": "Process Injection",
|
|
76
|
+
"version": "v17"
|
|
77
|
+
},
|
|
78
|
+
"T1059": {
|
|
79
|
+
"name": "Command and Scripting Interpreter",
|
|
80
|
+
"version": "v17"
|
|
81
|
+
},
|
|
82
|
+
"T1059.001": {
|
|
83
|
+
"name": "Command and Scripting Interpreter: PowerShell",
|
|
84
|
+
"version": "v17"
|
|
85
|
+
},
|
|
86
|
+
"T1059.006": {
|
|
87
|
+
"name": "Command and Scripting Interpreter: Python",
|
|
88
|
+
"version": "v17"
|
|
89
|
+
},
|
|
90
|
+
"T1059.007": {
|
|
91
|
+
"name": "Command and Scripting Interpreter: JavaScript",
|
|
92
|
+
"version": "v17"
|
|
93
|
+
},
|
|
94
|
+
"T1068": {
|
|
95
|
+
"name": "Exploitation for Privilege Escalation",
|
|
96
|
+
"version": "v17"
|
|
97
|
+
},
|
|
98
|
+
"T1071": {
|
|
99
|
+
"name": "Application Layer Protocol",
|
|
100
|
+
"version": "v17"
|
|
101
|
+
},
|
|
102
|
+
"T1078": {
|
|
103
|
+
"name": "Valid Accounts",
|
|
104
|
+
"version": "v17"
|
|
105
|
+
},
|
|
106
|
+
"T1078.001": {
|
|
107
|
+
"name": "Valid Accounts: Default Accounts",
|
|
108
|
+
"version": "v17"
|
|
109
|
+
},
|
|
110
|
+
"T1078.002": {
|
|
111
|
+
"name": "Valid Accounts: Domain Accounts",
|
|
112
|
+
"version": "v17"
|
|
113
|
+
},
|
|
114
|
+
"T1078.003": {
|
|
115
|
+
"name": "Valid Accounts: Local Accounts",
|
|
116
|
+
"version": "v17"
|
|
117
|
+
},
|
|
118
|
+
"T1078.004": {
|
|
119
|
+
"name": "Valid Accounts: Cloud Accounts",
|
|
120
|
+
"version": "v17"
|
|
121
|
+
},
|
|
122
|
+
"T1098": {
|
|
123
|
+
"name": "Account Manipulation",
|
|
124
|
+
"version": "v17"
|
|
125
|
+
},
|
|
126
|
+
"T1102": {
|
|
127
|
+
"name": "Web Service",
|
|
128
|
+
"version": "v17"
|
|
129
|
+
},
|
|
130
|
+
"T1110": {
|
|
131
|
+
"name": "Brute Force",
|
|
132
|
+
"version": "v17"
|
|
133
|
+
},
|
|
134
|
+
"T1110.001": {
|
|
135
|
+
"name": "Brute Force: Password Guessing",
|
|
136
|
+
"version": "v17"
|
|
137
|
+
},
|
|
138
|
+
"T1133": {
|
|
139
|
+
"name": "External Remote Services",
|
|
140
|
+
"version": "v17"
|
|
141
|
+
},
|
|
142
|
+
"T1136.001": {
|
|
143
|
+
"name": "Create Account: Local Account",
|
|
144
|
+
"version": "v17"
|
|
145
|
+
},
|
|
146
|
+
"T1190": {
|
|
147
|
+
"name": "Exploit Public-Facing Application",
|
|
148
|
+
"version": "v17"
|
|
149
|
+
},
|
|
150
|
+
"T1195": {
|
|
151
|
+
"name": "Supply Chain Compromise",
|
|
152
|
+
"version": "v17"
|
|
153
|
+
},
|
|
154
|
+
"T1195.001": {
|
|
155
|
+
"name": "Supply Chain Compromise: Software Dependencies and Development Tools",
|
|
156
|
+
"version": "v17"
|
|
157
|
+
},
|
|
158
|
+
"T1195.002": {
|
|
159
|
+
"name": "Supply Chain Compromise: Software Supply Chain",
|
|
160
|
+
"version": "v17"
|
|
161
|
+
},
|
|
162
|
+
"T1199": {
|
|
163
|
+
"name": "Trusted Relationship",
|
|
164
|
+
"version": "v17"
|
|
165
|
+
},
|
|
166
|
+
"T1203": {
|
|
167
|
+
"name": "Exploitation for Client Execution",
|
|
168
|
+
"version": "v17"
|
|
169
|
+
},
|
|
170
|
+
"T1212": {
|
|
171
|
+
"name": "Exploitation for Credential Access",
|
|
172
|
+
"version": "v17"
|
|
173
|
+
},
|
|
174
|
+
"T1213": {
|
|
175
|
+
"name": "Data from Information Repositories",
|
|
176
|
+
"version": "v17"
|
|
177
|
+
},
|
|
178
|
+
"T1485": {
|
|
179
|
+
"name": "Data Destruction",
|
|
180
|
+
"version": "v17"
|
|
181
|
+
},
|
|
182
|
+
"T1486": {
|
|
183
|
+
"name": "Data Encrypted for Impact",
|
|
184
|
+
"version": "v17"
|
|
185
|
+
},
|
|
186
|
+
"T1505": {
|
|
187
|
+
"name": "Server Software Component",
|
|
188
|
+
"version": "v17"
|
|
189
|
+
},
|
|
190
|
+
"T1518": {
|
|
191
|
+
"name": "Software Discovery",
|
|
192
|
+
"version": "v17"
|
|
193
|
+
},
|
|
194
|
+
"T1525": {
|
|
195
|
+
"name": "Implant Internal Image",
|
|
196
|
+
"version": "v17"
|
|
197
|
+
},
|
|
198
|
+
"T1528": {
|
|
199
|
+
"name": "Steal Application Access Token",
|
|
200
|
+
"version": "v17"
|
|
201
|
+
},
|
|
202
|
+
"T1530": {
|
|
203
|
+
"name": "Data from Cloud Storage",
|
|
204
|
+
"version": "v17"
|
|
205
|
+
},
|
|
206
|
+
"T1543": {
|
|
207
|
+
"name": "Create or Modify System Process",
|
|
208
|
+
"version": "v17"
|
|
209
|
+
},
|
|
210
|
+
"T1546": {
|
|
211
|
+
"name": "Event Triggered Execution",
|
|
212
|
+
"version": "v17"
|
|
213
|
+
},
|
|
214
|
+
"T1547": {
|
|
215
|
+
"name": "Boot or Logon Autostart Execution",
|
|
216
|
+
"version": "v17"
|
|
217
|
+
},
|
|
218
|
+
"T1548.001": {
|
|
219
|
+
"name": "Abuse Elevation Control Mechanism: Setuid and Setgid",
|
|
220
|
+
"version": "v17"
|
|
221
|
+
},
|
|
222
|
+
"T1548.003": {
|
|
223
|
+
"name": "Abuse Elevation Control Mechanism: Sudo and Sudo Caching",
|
|
224
|
+
"version": "v17"
|
|
225
|
+
},
|
|
226
|
+
"T1552": {
|
|
227
|
+
"name": "Unsecured Credentials",
|
|
228
|
+
"version": "v17"
|
|
229
|
+
},
|
|
230
|
+
"T1552.001": {
|
|
231
|
+
"name": "Unsecured Credentials: Credentials In Files",
|
|
232
|
+
"version": "v17"
|
|
233
|
+
},
|
|
234
|
+
"T1552.004": {
|
|
235
|
+
"name": "Unsecured Credentials: Private Keys",
|
|
236
|
+
"version": "v17"
|
|
237
|
+
},
|
|
238
|
+
"T1552.005": {
|
|
239
|
+
"name": "Unsecured Credentials: Cloud Instance Metadata API",
|
|
240
|
+
"version": "v17"
|
|
241
|
+
},
|
|
242
|
+
"T1552.007": {
|
|
243
|
+
"name": "Unsecured Credentials: Container API",
|
|
244
|
+
"version": "v17"
|
|
245
|
+
},
|
|
246
|
+
"T1554": {
|
|
247
|
+
"name": "Compromise Host Software Binary",
|
|
248
|
+
"version": "v17"
|
|
249
|
+
},
|
|
250
|
+
"T1555": {
|
|
251
|
+
"name": "Credentials from Password Stores",
|
|
252
|
+
"version": "v17"
|
|
253
|
+
},
|
|
254
|
+
"T1556": {
|
|
255
|
+
"name": "Modify Authentication Process",
|
|
256
|
+
"version": "v17"
|
|
257
|
+
},
|
|
258
|
+
"T1557": {
|
|
259
|
+
"name": "Adversary-in-the-Middle",
|
|
260
|
+
"version": "v17"
|
|
261
|
+
},
|
|
262
|
+
"T1562.001": {
|
|
263
|
+
"name": "Impair Defenses: Disable or Modify Tools",
|
|
264
|
+
"version": "v17"
|
|
265
|
+
},
|
|
266
|
+
"T1562.006": {
|
|
267
|
+
"name": "Impair Defenses: Indicator Blocking",
|
|
268
|
+
"version": "v17"
|
|
269
|
+
},
|
|
270
|
+
"T1565": {
|
|
271
|
+
"name": "Data Manipulation",
|
|
272
|
+
"version": "v17"
|
|
273
|
+
},
|
|
274
|
+
"T1566": {
|
|
275
|
+
"name": "Phishing",
|
|
276
|
+
"version": "v17"
|
|
277
|
+
},
|
|
278
|
+
"T1566.001": {
|
|
279
|
+
"name": "Phishing: Spearphishing Attachment",
|
|
280
|
+
"version": "v17"
|
|
281
|
+
},
|
|
282
|
+
"T1566.002": {
|
|
283
|
+
"name": "Phishing: Spearphishing Link",
|
|
284
|
+
"version": "v17"
|
|
285
|
+
},
|
|
286
|
+
"T1566.003": {
|
|
287
|
+
"name": "Phishing: Spearphishing via Service",
|
|
288
|
+
"version": "v17"
|
|
289
|
+
},
|
|
290
|
+
"T1567": {
|
|
291
|
+
"name": "Exfiltration Over Web Service",
|
|
292
|
+
"version": "v17"
|
|
293
|
+
},
|
|
294
|
+
"T1568": {
|
|
295
|
+
"name": "Dynamic Resolution",
|
|
296
|
+
"version": "v17"
|
|
297
|
+
},
|
|
298
|
+
"T1570": {
|
|
299
|
+
"name": "Lateral Tool Transfer",
|
|
300
|
+
"version": "v17",
|
|
301
|
+
"domain": "Enterprise"
|
|
302
|
+
},
|
|
303
|
+
"T1573": {
|
|
304
|
+
"name": "Encrypted Channel",
|
|
305
|
+
"version": "v17"
|
|
306
|
+
},
|
|
307
|
+
"T1574": {
|
|
308
|
+
"name": "Hijack Execution Flow",
|
|
309
|
+
"version": "v17"
|
|
310
|
+
},
|
|
311
|
+
"T1574.005": {
|
|
312
|
+
"name": "Hijack Execution Flow: Executable Installer File Permissions Weakness",
|
|
313
|
+
"version": "v17"
|
|
314
|
+
},
|
|
315
|
+
"T1595": {
|
|
316
|
+
"name": "Active Scanning",
|
|
317
|
+
"version": "v17"
|
|
318
|
+
},
|
|
319
|
+
"T1600": {
|
|
320
|
+
"name": "Weaken Encryption",
|
|
321
|
+
"version": "v17"
|
|
322
|
+
},
|
|
323
|
+
"T1606.001": {
|
|
324
|
+
"name": "Forge Web Credentials: Web Cookies",
|
|
325
|
+
"version": "v17"
|
|
326
|
+
},
|
|
327
|
+
"T1610": {
|
|
328
|
+
"name": "Deploy Container",
|
|
329
|
+
"version": "v17"
|
|
330
|
+
},
|
|
331
|
+
"T1611": {
|
|
332
|
+
"name": "Escape to Host",
|
|
333
|
+
"version": "v17"
|
|
334
|
+
},
|
|
335
|
+
"T1613": {
|
|
336
|
+
"name": "Container and Resource Discovery",
|
|
337
|
+
"version": "v17"
|
|
338
|
+
}
|
|
96
339
|
}
|