@blamejs/exceptd-skills 0.12.23 → 0.12.25
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +12 -4
- package/CHANGELOG.md +190 -3
- package/README.md +14 -1
- package/bin/exceptd.js +584 -166
- package/data/_indexes/_meta.json +31 -31
- package/data/_indexes/activity-feed.json +45 -45
- package/data/_indexes/catalog-summaries.json +19 -19
- package/data/_indexes/chains.json +320 -0
- package/data/_indexes/currency.json +9 -9
- package/data/_indexes/frequency.json +39 -2
- package/data/_indexes/jurisdiction-clocks.json +2 -2
- package/data/_indexes/jurisdiction-map.json +3 -1
- package/data/_indexes/section-offsets.json +396 -396
- package/data/_indexes/summary-cards.json +3 -3
- package/data/_indexes/token-budget.json +73 -73
- package/data/atlas-ttps.json +491 -19
- package/data/attack-techniques.json +198 -84
- package/data/cve-catalog.json +1309 -9
- package/data/exploit-availability.json +300 -10
- package/data/framework-control-gaps.json +395 -1
- package/data/global-frameworks.json +44 -19
- package/data/playbooks/containers.json +1 -1
- package/data/playbooks/crypto-codebase.json +1 -1
- package/data/playbooks/framework.json +1 -1
- package/data/playbooks/hardening.json +1 -1
- package/data/playbooks/library-author.json +1 -1
- package/data/playbooks/secrets.json +25 -1
- package/data/rfc-references.json +93 -1
- package/data/zeroday-lessons.json +475 -13
- package/lib/auto-discovery.js +26 -2
- package/lib/exit-codes.js +72 -0
- package/lib/flag-suggest.js +130 -0
- package/lib/id-validation.js +95 -0
- package/lib/lint-skills.js +68 -1
- package/lib/playbook-runner.js +321 -46
- package/lib/prefetch.js +113 -0
- package/lib/refresh-external.js +190 -8
- package/lib/refresh-network.js +35 -8
- package/lib/schemas/cve-catalog.schema.json +31 -4
- package/lib/schemas/playbook.schema.json +51 -0
- package/lib/scoring.js +41 -0
- package/lib/upstream-check-cli.js +16 -1
- package/lib/upstream-check.js +9 -0
- package/lib/verify.js +20 -4
- package/manifest-snapshot.json +1 -1
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +59 -59
- package/package.json +8 -2
- package/sbom.cdx.json +6 -6
- package/scripts/check-test-coverage.js +67 -0
- package/scripts/verify-shipped-tarball.js +9 -0
- package/skills/ai-attack-surface/skill.md +11 -2
- package/skills/ai-c2-detection/skill.md +3 -1
- package/skills/ai-risk-management/skill.md +3 -1
- package/skills/api-security/skill.md +4 -0
- package/skills/attack-surface-pentest/skill.md +1 -0
- package/skills/container-runtime-security/skill.md +3 -1
- package/skills/dlp-gap-analysis/skill.md +1 -1
- package/skills/exploit-scoring/skill.md +2 -2
- package/skills/incident-response-playbook/skill.md +1 -1
- package/skills/kernel-lpe-triage/skill.md +6 -1
- package/skills/mcp-agent-trust/skill.md +7 -2
- package/skills/mlops-security/skill.md +1 -1
- package/skills/rag-pipeline-security/skill.md +4 -2
- package/skills/sector-financial/skill.md +1 -1
- package/skills/skill-update-loop/skill.md +1 -1
- package/skills/supply-chain-integrity/skill.md +3 -1
- package/skills/threat-model-currency/skill.md +1 -1
- package/skills/webapp-security/skill.md +2 -0
- package/skills/zeroday-gap-learn/skill.md +2 -2
package/data/_indexes/_meta.json
CHANGED
|
@@ -1,57 +1,57 @@
|
|
|
1
1
|
{
|
|
2
2
|
"schema_version": "1.1.0",
|
|
3
|
-
"generated_at": "2026-05-
|
|
3
|
+
"generated_at": "2026-05-15T21:42:12.284Z",
|
|
4
4
|
"generator": "scripts/build-indexes.js",
|
|
5
5
|
"source_count": 50,
|
|
6
6
|
"source_hashes": {
|
|
7
|
-
"manifest.json": "
|
|
8
|
-
"data/atlas-ttps.json": "
|
|
9
|
-
"data/attack-techniques.json": "
|
|
10
|
-
"data/cve-catalog.json": "
|
|
7
|
+
"manifest.json": "f239465cd6c7d357bc185eef6457023de3433c8e9d07feb0008319915d142cd0",
|
|
8
|
+
"data/atlas-ttps.json": "f3d3ecb459ef5fb0d2c8339cd37072e1367a08d5a2fdef3d92c892a4b52dab97",
|
|
9
|
+
"data/attack-techniques.json": "6b45448aa42cc6664376c93da73356624708e935c12589ee8c776a10215bce3a",
|
|
10
|
+
"data/cve-catalog.json": "a2acad16f5e3856b07019fa00110e9dcb38ec5cc71b318d0e164bfcba7f4f644",
|
|
11
11
|
"data/cwe-catalog.json": "19893d2a7139d86ff3fcf296b0e6cda10e357727a1d1ffb56af282104e99157a",
|
|
12
12
|
"data/d3fend-catalog.json": "d219520c8d3eb61a270b25ea60f64721035e98a8d5d51d1a4e1f1140d9a586f9",
|
|
13
13
|
"data/dlp-controls.json": "8ea8d907aea0a2cfd772b048a62122a322ba3284a5c36a272ad5e9d392564cb5",
|
|
14
|
-
"data/exploit-availability.json": "
|
|
15
|
-
"data/framework-control-gaps.json": "
|
|
16
|
-
"data/global-frameworks.json": "
|
|
17
|
-
"data/rfc-references.json": "
|
|
18
|
-
"data/zeroday-lessons.json": "
|
|
19
|
-
"skills/kernel-lpe-triage/skill.md": "
|
|
20
|
-
"skills/ai-attack-surface/skill.md": "
|
|
21
|
-
"skills/mcp-agent-trust/skill.md": "
|
|
14
|
+
"data/exploit-availability.json": "a9eeda95d24b56c28a0d0178fc601b531653e2ba7dc857160b35ad23ad6c7471",
|
|
15
|
+
"data/framework-control-gaps.json": "8fb42b8a1503bda7d24bc48e34c5e26c425f5985767853ed1e1b8b3a5318369e",
|
|
16
|
+
"data/global-frameworks.json": "0168825497e03f079274c9da2e5529310a2ba5bd7c7da7c93acd0b66ed845b8a",
|
|
17
|
+
"data/rfc-references.json": "e88c1517f0ffc45c27bc5805c01de87994b9e65b54071699b3d7cb5832b82c7a",
|
|
18
|
+
"data/zeroday-lessons.json": "d960e5f8ca7a83c10194cd60207e13046a7eee1b8793e2f3de79475db283f800",
|
|
19
|
+
"skills/kernel-lpe-triage/skill.md": "8e94bfd38d6db47342fbbe95a0c8df8f7c38743982c13e9de6a1c59cd3783d33",
|
|
20
|
+
"skills/ai-attack-surface/skill.md": "13e543fc92b9b27cdb647dce96a9eeb44919e0fa92ec41e8265a9981a23e7b79",
|
|
21
|
+
"skills/mcp-agent-trust/skill.md": "3cec1dce668deec44cb7330e165e89cee8379dd90833519004d566baf72c038c",
|
|
22
22
|
"skills/framework-gap-analysis/skill.md": "573a097ceb4c952fe7ab3db765c942d06cc8e90f7cda3c42928db35cdcd7cf7b",
|
|
23
23
|
"skills/compliance-theater/skill.md": "367cde42553dfb59b0cb6e8afb6e88be28ec0ab73682ea3a9d397ca0068753bc",
|
|
24
|
-
"skills/exploit-scoring/skill.md": "
|
|
25
|
-
"skills/rag-pipeline-security/skill.md": "
|
|
26
|
-
"skills/ai-c2-detection/skill.md": "
|
|
24
|
+
"skills/exploit-scoring/skill.md": "4213724d59d33d8fe768b3ce58edc3aed25c0f06031183542937a14d538ea94d",
|
|
25
|
+
"skills/rag-pipeline-security/skill.md": "fc027d5e101a9934b402ed4086b9cbb8b2ee6b86f00e1feb54fe15a2018d89fc",
|
|
26
|
+
"skills/ai-c2-detection/skill.md": "cdfbc086ed2b755a9d3170d66d0c33519478b693fb59944ac95a1749beb5c810",
|
|
27
27
|
"skills/policy-exception-gen/skill.md": "79db45ba722a6dd9bba25bf84e0b52cf659b56b662193cef80a8273337e41df9",
|
|
28
|
-
"skills/threat-model-currency/skill.md": "
|
|
28
|
+
"skills/threat-model-currency/skill.md": "d1cf822c1e8a81466dc49e81b19f42d863c82bd8f8c878215a738e6ae9112fc5",
|
|
29
29
|
"skills/global-grc/skill.md": "e0487de49679172347653d8c191d1f269193de6f444f6b0c6396d326e45bd72e",
|
|
30
|
-
"skills/zeroday-gap-learn/skill.md": "
|
|
30
|
+
"skills/zeroday-gap-learn/skill.md": "5caa007d8c95f49ded22db581fd447f735c713b60866d18f5371457b0a60778b",
|
|
31
31
|
"skills/pqc-first/skill.md": "a5eb776e1ea3bb422a4c18a3bdf39ad2ec1651b3c25e65c89428ba319141b275",
|
|
32
|
-
"skills/skill-update-loop/skill.md": "
|
|
32
|
+
"skills/skill-update-loop/skill.md": "48617511ee8efdb257e9caee543009150f0638380ad92882b62021c7eb2f9d16",
|
|
33
33
|
"skills/security-maturity-tiers/skill.md": "817f0bca44297d03fb206c446fbf3f93aa3a64c309d6ef5efd046e6e47874030",
|
|
34
34
|
"skills/researcher/skill.md": "51d03d9eaea52d2bbbdd67709035db494d44819ce58931ca025cab3025c9fad7",
|
|
35
|
-
"skills/attack-surface-pentest/skill.md": "
|
|
35
|
+
"skills/attack-surface-pentest/skill.md": "3c42af04a5db79ce10c952f4bc7c9216116e77d38e6d57feb1f1c13678c94e53",
|
|
36
36
|
"skills/fuzz-testing-strategy/skill.md": "83b1929a0d1e09a58908b91125ebc91ff14323ab9acc9bab6c4b04903b69b837",
|
|
37
|
-
"skills/dlp-gap-analysis/skill.md": "
|
|
38
|
-
"skills/supply-chain-integrity/skill.md": "
|
|
37
|
+
"skills/dlp-gap-analysis/skill.md": "eed1a5de55a9200e6f5c8ac49b0240b54d30b895ce40ccce9d286f5d9b40f664",
|
|
38
|
+
"skills/supply-chain-integrity/skill.md": "2f9bc5d5f0b70bf468d02a71ced718b50196e6139dfb1424d31cbe017d422027",
|
|
39
39
|
"skills/defensive-countermeasure-mapping/skill.md": "e62c71ba3be2b4d0f7dfa529fec007cba6bee3013f76b93756e3e6310f2d22ab",
|
|
40
40
|
"skills/identity-assurance/skill.md": "6fd734d5cf8eed031537c9ccb1ad11c09ec4e88d31c45d86046a2154a6770990",
|
|
41
41
|
"skills/ot-ics-security/skill.md": "d239ed497816e00ad14568e9fcca68ffdc7cb0c2a2cbd4960b35fab2065cce31",
|
|
42
42
|
"skills/coordinated-vuln-disclosure/skill.md": "c96fd2254abf8a29819f8175da85094bea1afe589fecc92abcf1289b30895030",
|
|
43
43
|
"skills/threat-modeling-methodology/skill.md": "d57d1acc46851d4f1580858c60a90cc20732ca8a5a46da2c50e71c9bdf4cc0b4",
|
|
44
|
-
"skills/webapp-security/skill.md": "
|
|
45
|
-
"skills/ai-risk-management/skill.md": "
|
|
44
|
+
"skills/webapp-security/skill.md": "69b16f51ce79cbebd15120d6a0de1c116439bc4739c7dcaa0ecd451614038ad5",
|
|
45
|
+
"skills/ai-risk-management/skill.md": "10d31ca594449e1fef4c34ea45448ab30a6ffdc2fe1faf4ccaf0a1dd05d67774",
|
|
46
46
|
"skills/sector-healthcare/skill.md": "97b4486419ab4480266bf2e938564d52bb1cdd70faae09697f695772adf02029",
|
|
47
|
-
"skills/sector-financial/skill.md": "
|
|
47
|
+
"skills/sector-financial/skill.md": "eec3ce95f36a0f70532aac2f658ad6fb350233dd49c7d95da91144e6c4c4d16c",
|
|
48
48
|
"skills/sector-federal-government/skill.md": "48c3c019502c8b758598331dbad8a9b121f8dd3dc6fc68bfaf506eba7e3843e5",
|
|
49
49
|
"skills/sector-energy/skill.md": "875799aa2ad88744b646583fef0a3399abd42a979541dc99bf39825a5ef48ce9",
|
|
50
|
-
"skills/api-security/skill.md": "
|
|
50
|
+
"skills/api-security/skill.md": "302f7f6a071b856cc55a4cb5f0bc3f8566e31b5ebca58ca3bd78a91d4b6665ca",
|
|
51
51
|
"skills/cloud-security/skill.md": "e0574c153aefbb0fc4581c78bc2d708ab7c49d6b5a45a985e51967b8ea740eb9",
|
|
52
|
-
"skills/container-runtime-security/skill.md": "
|
|
53
|
-
"skills/mlops-security/skill.md": "
|
|
54
|
-
"skills/incident-response-playbook/skill.md": "
|
|
52
|
+
"skills/container-runtime-security/skill.md": "f06260f0c468d6a4f0409294899017edab45c98d71db1fedd7a630fe6a7bf53a",
|
|
53
|
+
"skills/mlops-security/skill.md": "e6a296fc67724aa3b026c0039f44867b44cf0926eade4fe616bfd0a4c77310bf",
|
|
54
|
+
"skills/incident-response-playbook/skill.md": "8ef7ce1246dc1329b6df3cc9de8d79d35e2c02c703dcef20f35b312b1c24fd52",
|
|
55
55
|
"skills/email-security-anti-phishing/skill.md": "b5a7693b3ddbd6cd83303d092bc5e324db431245d25c4945d9f65fcffa1995e7",
|
|
56
56
|
"skills/age-gates-child-safety/skill.md": "c741d7dca9da0abb09bdebb8a02e803ce4ae9fb9a6904fb8df3ec19cae83917d"
|
|
57
57
|
},
|
|
@@ -68,13 +68,13 @@
|
|
|
68
68
|
"dlp_refs": 0
|
|
69
69
|
},
|
|
70
70
|
"trigger_table_entries": 453,
|
|
71
|
-
"chains_cve_entries":
|
|
71
|
+
"chains_cve_entries": 27,
|
|
72
72
|
"chains_cwe_entries": 55,
|
|
73
73
|
"jurisdictions_indexed": 29,
|
|
74
74
|
"handoff_dag_nodes": 38,
|
|
75
75
|
"summary_cards": 38,
|
|
76
76
|
"section_offsets_skills": 38,
|
|
77
|
-
"token_budget_total_approx":
|
|
77
|
+
"token_budget_total_approx": 357564,
|
|
78
78
|
"recipes": 8,
|
|
79
79
|
"jurisdiction_clocks": 29,
|
|
80
80
|
"did_ladders": 8,
|
|
@@ -6,20 +6,60 @@
|
|
|
6
6
|
},
|
|
7
7
|
"events": [
|
|
8
8
|
{
|
|
9
|
-
"date": "2026-05-
|
|
9
|
+
"date": "2026-05-15",
|
|
10
10
|
"type": "catalog_update",
|
|
11
11
|
"artifact": "data/atlas-ttps.json",
|
|
12
12
|
"path": "data/atlas-ttps.json",
|
|
13
13
|
"schema_version": "1.0.0",
|
|
14
|
-
"entry_count":
|
|
14
|
+
"entry_count": 29
|
|
15
15
|
},
|
|
16
16
|
{
|
|
17
|
-
"date": "2026-05-
|
|
17
|
+
"date": "2026-05-15",
|
|
18
18
|
"type": "catalog_update",
|
|
19
19
|
"artifact": "data/attack-techniques.json",
|
|
20
20
|
"path": "data/attack-techniques.json",
|
|
21
21
|
"schema_version": "1.0.0",
|
|
22
|
-
"entry_count":
|
|
22
|
+
"entry_count": 91
|
|
23
|
+
},
|
|
24
|
+
{
|
|
25
|
+
"date": "2026-05-15",
|
|
26
|
+
"type": "catalog_update",
|
|
27
|
+
"artifact": "data/exploit-availability.json",
|
|
28
|
+
"path": "data/exploit-availability.json",
|
|
29
|
+
"schema_version": "1.1.0",
|
|
30
|
+
"entry_count": 30
|
|
31
|
+
},
|
|
32
|
+
{
|
|
33
|
+
"date": "2026-05-15",
|
|
34
|
+
"type": "catalog_update",
|
|
35
|
+
"artifact": "data/framework-control-gaps.json",
|
|
36
|
+
"path": "data/framework-control-gaps.json",
|
|
37
|
+
"schema_version": "1.0.0",
|
|
38
|
+
"entry_count": 78
|
|
39
|
+
},
|
|
40
|
+
{
|
|
41
|
+
"date": "2026-05-15",
|
|
42
|
+
"type": "catalog_update",
|
|
43
|
+
"artifact": "data/global-frameworks.json",
|
|
44
|
+
"path": "data/global-frameworks.json",
|
|
45
|
+
"schema_version": "1.3.0",
|
|
46
|
+
"entry_count": 35
|
|
47
|
+
},
|
|
48
|
+
{
|
|
49
|
+
"date": "2026-05-15",
|
|
50
|
+
"type": "catalog_update",
|
|
51
|
+
"artifact": "data/rfc-references.json",
|
|
52
|
+
"path": "data/rfc-references.json",
|
|
53
|
+
"schema_version": "1.0.0",
|
|
54
|
+
"entry_count": 38
|
|
55
|
+
},
|
|
56
|
+
{
|
|
57
|
+
"date": "2026-05-15",
|
|
58
|
+
"type": "catalog_update",
|
|
59
|
+
"artifact": "data/zeroday-lessons.json",
|
|
60
|
+
"path": "data/zeroday-lessons.json",
|
|
61
|
+
"schema_version": "1.1.0",
|
|
62
|
+
"entry_count": 15
|
|
23
63
|
},
|
|
24
64
|
{
|
|
25
65
|
"date": "2026-05-13",
|
|
@@ -27,7 +67,7 @@
|
|
|
27
67
|
"artifact": "data/cve-catalog.json",
|
|
28
68
|
"path": "data/cve-catalog.json",
|
|
29
69
|
"schema_version": "1.0.0",
|
|
30
|
-
"entry_count":
|
|
70
|
+
"entry_count": 30
|
|
31
71
|
},
|
|
32
72
|
{
|
|
33
73
|
"date": "2026-05-13",
|
|
@@ -45,14 +85,6 @@
|
|
|
45
85
|
"schema_version": "1.0.0",
|
|
46
86
|
"entry_count": 28
|
|
47
87
|
},
|
|
48
|
-
{
|
|
49
|
-
"date": "2026-05-13",
|
|
50
|
-
"type": "catalog_update",
|
|
51
|
-
"artifact": "data/zeroday-lessons.json",
|
|
52
|
-
"path": "data/zeroday-lessons.json",
|
|
53
|
-
"schema_version": "1.0.0",
|
|
54
|
-
"entry_count": 10
|
|
55
|
-
},
|
|
56
88
|
{
|
|
57
89
|
"date": "2026-05-11",
|
|
58
90
|
"type": "skill_review",
|
|
@@ -222,22 +254,6 @@
|
|
|
222
254
|
"schema_version": "1.0.0",
|
|
223
255
|
"entry_count": 22
|
|
224
256
|
},
|
|
225
|
-
{
|
|
226
|
-
"date": "2026-05-11",
|
|
227
|
-
"type": "catalog_update",
|
|
228
|
-
"artifact": "data/global-frameworks.json",
|
|
229
|
-
"path": "data/global-frameworks.json",
|
|
230
|
-
"schema_version": "1.3.0",
|
|
231
|
-
"entry_count": 35
|
|
232
|
-
},
|
|
233
|
-
{
|
|
234
|
-
"date": "2026-05-11",
|
|
235
|
-
"type": "catalog_update",
|
|
236
|
-
"artifact": "data/rfc-references.json",
|
|
237
|
-
"path": "data/rfc-references.json",
|
|
238
|
-
"schema_version": "1.0.0",
|
|
239
|
-
"entry_count": 31
|
|
240
|
-
},
|
|
241
257
|
{
|
|
242
258
|
"date": "2026-05-01",
|
|
243
259
|
"type": "skill_review",
|
|
@@ -343,22 +359,6 @@
|
|
|
343
359
|
"path": "skills/security-maturity-tiers/skill.md",
|
|
344
360
|
"note": "Three-tier implementation roadmap — MVP (ship this week), Practical (scalable today), Overkill (defense-in-depth)"
|
|
345
361
|
},
|
|
346
|
-
{
|
|
347
|
-
"date": "2026-05-01",
|
|
348
|
-
"type": "catalog_update",
|
|
349
|
-
"artifact": "data/exploit-availability.json",
|
|
350
|
-
"path": "data/exploit-availability.json",
|
|
351
|
-
"schema_version": "1.0.0",
|
|
352
|
-
"entry_count": 10
|
|
353
|
-
},
|
|
354
|
-
{
|
|
355
|
-
"date": "2026-05-01",
|
|
356
|
-
"type": "catalog_update",
|
|
357
|
-
"artifact": "data/framework-control-gaps.json",
|
|
358
|
-
"path": "data/framework-control-gaps.json",
|
|
359
|
-
"schema_version": "1.0.0",
|
|
360
|
-
"entry_count": 62
|
|
361
|
-
},
|
|
362
362
|
{
|
|
363
363
|
"date": "2026-05-01",
|
|
364
364
|
"type": "manifest_review",
|
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
"path": "data/atlas-ttps.json",
|
|
10
10
|
"purpose": "MITRE ATLAS TTPs (AML.T0xxx) cited by skills, with tactic, name, description. Pinned to ATLAS v5.1.0 (November 2025).",
|
|
11
11
|
"schema_version": "1.0.0",
|
|
12
|
-
"last_updated": "2026-05-
|
|
12
|
+
"last_updated": "2026-05-15",
|
|
13
13
|
"tlp": "CLEAR",
|
|
14
14
|
"source_confidence_default": "A1",
|
|
15
15
|
"freshness_policy": {
|
|
@@ -18,29 +18,29 @@
|
|
|
18
18
|
"rebuild_after_days": 365,
|
|
19
19
|
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
20
20
|
},
|
|
21
|
-
"entry_count":
|
|
21
|
+
"entry_count": 29,
|
|
22
22
|
"sample_keys": [
|
|
23
|
+
"AML.T0001",
|
|
23
24
|
"AML.T0010",
|
|
24
25
|
"AML.T0016",
|
|
25
26
|
"AML.T0017",
|
|
26
|
-
"AML.T0018"
|
|
27
|
-
"AML.T0020"
|
|
27
|
+
"AML.T0018"
|
|
28
28
|
]
|
|
29
29
|
},
|
|
30
30
|
"attack-techniques.json": {
|
|
31
31
|
"path": "data/attack-techniques.json",
|
|
32
32
|
"purpose": null,
|
|
33
33
|
"schema_version": "1.0.0",
|
|
34
|
-
"last_updated": "2026-05-
|
|
34
|
+
"last_updated": "2026-05-15",
|
|
35
35
|
"tlp": "CLEAR",
|
|
36
36
|
"source_confidence_default": "A1",
|
|
37
37
|
"freshness_policy": {
|
|
38
38
|
"default_review_cadence_days": 90,
|
|
39
39
|
"stale_after_days": 180,
|
|
40
40
|
"rebuild_after_days": 365,
|
|
41
|
-
"note": "Catalog must be rebuilt against the upstream ATT&CK release whenever MITRE publishes a new version. AGENTS.md
|
|
41
|
+
"note": "Catalog must be rebuilt against the upstream ATT&CK release whenever MITRE publishes a new version. AGENTS.md external-data version-pinning rule requires the bump to be intentional, not silent. ATT&CK ships semi-annually (April + October); audit on each release for tactic moves, technique splits, and new Detection Strategies."
|
|
42
42
|
},
|
|
43
|
-
"entry_count":
|
|
43
|
+
"entry_count": 91,
|
|
44
44
|
"sample_keys": [
|
|
45
45
|
"T0001",
|
|
46
46
|
"T0017",
|
|
@@ -62,7 +62,7 @@
|
|
|
62
62
|
"rebuild_after_days": 365,
|
|
63
63
|
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
64
64
|
},
|
|
65
|
-
"entry_count":
|
|
65
|
+
"entry_count": 30,
|
|
66
66
|
"sample_keys": [
|
|
67
67
|
"CVE-2025-53773",
|
|
68
68
|
"CVE-2026-30615",
|
|
@@ -140,8 +140,8 @@
|
|
|
140
140
|
"exploit-availability.json": {
|
|
141
141
|
"path": "data/exploit-availability.json",
|
|
142
142
|
"purpose": "Per-CVE exploit availability: PoC public status, weaponization signal, AI-assist status, blast-radius. Project-curated (B2 Admiralty confidence) with source citations.",
|
|
143
|
-
"schema_version": "1.
|
|
144
|
-
"last_updated": "2026-05-
|
|
143
|
+
"schema_version": "1.1.0",
|
|
144
|
+
"last_updated": "2026-05-15",
|
|
145
145
|
"tlp": "CLEAR",
|
|
146
146
|
"source_confidence_default": "B2",
|
|
147
147
|
"freshness_policy": {
|
|
@@ -150,7 +150,7 @@
|
|
|
150
150
|
"rebuild_after_days": 365,
|
|
151
151
|
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
152
152
|
},
|
|
153
|
-
"entry_count":
|
|
153
|
+
"entry_count": 30,
|
|
154
154
|
"sample_keys": [
|
|
155
155
|
"CVE-2025-53773",
|
|
156
156
|
"CVE-2026-30615",
|
|
@@ -163,7 +163,7 @@
|
|
|
163
163
|
"path": "data/framework-control-gaps.json",
|
|
164
164
|
"purpose": "Per-control framework gap declarations: SI-2, A.8.8, PCI 6.3.3, etc. Each entry names the control, the lag, the evidence CVE, and remediation guidance.",
|
|
165
165
|
"schema_version": "1.0.0",
|
|
166
|
-
"last_updated": "2026-05-
|
|
166
|
+
"last_updated": "2026-05-15",
|
|
167
167
|
"tlp": "CLEAR",
|
|
168
168
|
"source_confidence_default": "A1",
|
|
169
169
|
"freshness_policy": {
|
|
@@ -172,7 +172,7 @@
|
|
|
172
172
|
"rebuild_after_days": 365,
|
|
173
173
|
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
174
174
|
},
|
|
175
|
-
"entry_count":
|
|
175
|
+
"entry_count": 78,
|
|
176
176
|
"sample_keys": [
|
|
177
177
|
"ALL-AI-PIPELINE-INTEGRITY",
|
|
178
178
|
"ALL-MCP-TOOL-TRUST",
|
|
@@ -185,7 +185,7 @@
|
|
|
185
185
|
"path": "data/global-frameworks.json",
|
|
186
186
|
"purpose": "Multi-jurisdiction framework registry: 34 jurisdictions × applicable frameworks × patch_sla / notification_sla / critical_controls / framework_gaps. Cross-cutting authority for jurisdiction-clocks index.",
|
|
187
187
|
"schema_version": "1.3.0",
|
|
188
|
-
"last_updated": "2026-05-
|
|
188
|
+
"last_updated": "2026-05-15",
|
|
189
189
|
"tlp": "CLEAR",
|
|
190
190
|
"source_confidence_default": "A1",
|
|
191
191
|
"freshness_policy": {
|
|
@@ -207,7 +207,7 @@
|
|
|
207
207
|
"path": "data/rfc-references.json",
|
|
208
208
|
"purpose": "IETF RFCs + active Internet-Drafts cited by skills (TLS, IPsec, PQ crypto migration, HTTP/3, CT). Cross-validated against IETF Datatracker via validate-rfcs.",
|
|
209
209
|
"schema_version": "1.0.0",
|
|
210
|
-
"last_updated": "2026-05-
|
|
210
|
+
"last_updated": "2026-05-15",
|
|
211
211
|
"tlp": "CLEAR",
|
|
212
212
|
"source_confidence_default": "A1",
|
|
213
213
|
"freshness_policy": {
|
|
@@ -216,7 +216,7 @@
|
|
|
216
216
|
"rebuild_after_days": 365,
|
|
217
217
|
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
218
218
|
},
|
|
219
|
-
"entry_count":
|
|
219
|
+
"entry_count": 38,
|
|
220
220
|
"sample_keys": [
|
|
221
221
|
"RFC-4301",
|
|
222
222
|
"RFC-4303",
|
|
@@ -228,8 +228,8 @@
|
|
|
228
228
|
"zeroday-lessons.json": {
|
|
229
229
|
"path": "data/zeroday-lessons.json",
|
|
230
230
|
"purpose": "Distilled lessons from notable zero-days and campaigns (SesameOp, Copy Fail, Dirty Frag, Copilot RCE, Windsurf MCP). Each entry: technique, distinguishing characteristic, what it means for the framework lag.",
|
|
231
|
-
"schema_version": "1.
|
|
232
|
-
"last_updated": "2026-05-
|
|
231
|
+
"schema_version": "1.1.0",
|
|
232
|
+
"last_updated": "2026-05-15",
|
|
233
233
|
"tlp": "CLEAR",
|
|
234
234
|
"source_confidence_default": "B2",
|
|
235
235
|
"freshness_policy": {
|
|
@@ -238,7 +238,7 @@
|
|
|
238
238
|
"rebuild_after_days": 365,
|
|
239
239
|
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
240
240
|
},
|
|
241
|
-
"entry_count":
|
|
241
|
+
"entry_count": 15,
|
|
242
242
|
"sample_keys": [
|
|
243
243
|
"CVE-2026-31431",
|
|
244
244
|
"CVE-2025-53773",
|