@blamejs/exceptd-skills 0.12.24 → 0.12.25

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (46) hide show
  1. package/AGENTS.md +12 -4
  2. package/CHANGELOG.md +83 -0
  3. package/data/_indexes/_meta.json +31 -31
  4. package/data/_indexes/activity-feed.json +45 -45
  5. package/data/_indexes/catalog-summaries.json +19 -19
  6. package/data/_indexes/chains.json +320 -0
  7. package/data/_indexes/currency.json +9 -9
  8. package/data/_indexes/frequency.json +39 -2
  9. package/data/_indexes/jurisdiction-clocks.json +2 -2
  10. package/data/_indexes/jurisdiction-map.json +3 -1
  11. package/data/_indexes/section-offsets.json +396 -396
  12. package/data/_indexes/summary-cards.json +3 -3
  13. package/data/_indexes/token-budget.json +73 -73
  14. package/data/atlas-ttps.json +491 -19
  15. package/data/attack-techniques.json +198 -84
  16. package/data/cve-catalog.json +1309 -9
  17. package/data/exploit-availability.json +300 -10
  18. package/data/framework-control-gaps.json +395 -1
  19. package/data/global-frameworks.json +44 -19
  20. package/data/rfc-references.json +93 -1
  21. package/data/zeroday-lessons.json +475 -13
  22. package/lib/schemas/cve-catalog.schema.json +24 -3
  23. package/manifest-snapshot.json +1 -1
  24. package/manifest-snapshot.sha256 +1 -1
  25. package/manifest.json +59 -59
  26. package/package.json +1 -1
  27. package/sbom.cdx.json +6 -6
  28. package/skills/ai-attack-surface/skill.md +11 -2
  29. package/skills/ai-c2-detection/skill.md +3 -1
  30. package/skills/ai-risk-management/skill.md +3 -1
  31. package/skills/api-security/skill.md +4 -0
  32. package/skills/attack-surface-pentest/skill.md +1 -0
  33. package/skills/container-runtime-security/skill.md +3 -1
  34. package/skills/dlp-gap-analysis/skill.md +1 -1
  35. package/skills/exploit-scoring/skill.md +2 -2
  36. package/skills/incident-response-playbook/skill.md +1 -1
  37. package/skills/kernel-lpe-triage/skill.md +6 -1
  38. package/skills/mcp-agent-trust/skill.md +7 -2
  39. package/skills/mlops-security/skill.md +1 -1
  40. package/skills/rag-pipeline-security/skill.md +4 -2
  41. package/skills/sector-financial/skill.md +1 -1
  42. package/skills/skill-update-loop/skill.md +1 -1
  43. package/skills/supply-chain-integrity/skill.md +3 -1
  44. package/skills/threat-model-currency/skill.md +1 -1
  45. package/skills/webapp-security/skill.md +2 -0
  46. package/skills/zeroday-gap-learn/skill.md +2 -2
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "_meta": {
3
3
  "schema_version": "1.0.0",
4
- "last_updated": "2026-05-01",
4
+ "last_updated": "2026-05-15",
5
5
  "note": "status: open = gap still exists. status: closed = framework update closed the gap. Never delete entries — preserve gap history.",
6
6
  "tlp": "CLEAR",
7
7
  "source_confidence": {
@@ -308,6 +308,108 @@
308
308
  "T1195.002"
309
309
  ]
310
310
  },
311
+ "DORA-RTS-Subcontracting": {
312
+ "framework": "EU DORA (Regulation 2022/2554) — RTS on subcontracting of ICT services supporting critical or important functions",
313
+ "control_id": "RTS-Subcontracting-2024",
314
+ "control_name": "Regulatory Technical Standard on subcontracting (Commission Delegated Regulation supplementing Art. 30(5))",
315
+ "designed_for": "Mandates contractual + register-level visibility of the full subcontracting chain for ICT services supporting critical or important functions of financial entities. Active 2026-01-17 (Commission Delegated Regulation (EU) 2025/420). Cross-walks to ESMA/EBA/EIOPA joint guidelines on the register of information, EU NIS2 Art. 21(2)(d), UK PRA SS2/21, AU CPS 230.",
316
+ "misses": [
317
+ "AI-provider sub-processor chain — model APIs, embedding services, vector stores, fine-tune providers compose under a single user-facing endpoint with sub-processor visibility that the RTS register fields do not enumerate",
318
+ "MCP server distribution: an MCP server installed by a developer is a de-facto subcontractor for any ICT function the agent supports, with no contractual nexus the financial entity controls",
319
+ "Concentration risk fields capture cloud-provider concentration but not foundation-model concentration (3-4 frontier LLM providers underpin most production AI workflows in 2026)",
320
+ "Cross-border AI inference routing is not captured in the residency fields — model API calls regularly traverse multiple jurisdictions inside a single 'sub-processor' line item"
321
+ ],
322
+ "real_requirement": "RTS subcontracting register must add: (1) AI sub-processor enumeration (model provider, embedding provider, vector store, RAG corpus host) per ICT service line, (2) MCP server inventory treated as a subcontractor class, (3) foundation-model concentration analysis alongside cloud-provider concentration, (4) per-call inference-routing residency for AI services, (5) explicit cross-walk to UK PRA SS2/21 + AU CPS 230 for cross-border AI sub-processor disclosure.",
323
+ "status": "open",
324
+ "opened_date": "2026-05-15",
325
+ "evidence_cves": [
326
+ "CVE-2026-30615"
327
+ ],
328
+ "atlas_refs": [
329
+ "AML.T0010"
330
+ ],
331
+ "attack_refs": [
332
+ "T1195.001",
333
+ "T1195.002"
334
+ ]
335
+ },
336
+ "DORA-ITS-TLPT": {
337
+ "framework": "EU DORA (Regulation 2022/2554) — ITS on threat-led penetration testing under Art. 26",
338
+ "control_id": "ITS-TLPT-2026",
339
+ "control_name": "Implementing Technical Standard on Threat-Led Penetration Testing (TLPT) for significant financial entities",
340
+ "designed_for": "Operationalises Art. 26 TLPT obligations: scope, methodology, certifications for testers, intelligence-led red-team execution aligned with TIBER-EU. Active 2026-Q3. Cross-walks to UK CBEST, AU CORIE, NL TIBER-NL, ECB TIBER-EU framework, NIST SP 800-115.",
341
+ "misses": [
342
+ "AI/MCP asset classes not enumerated in the TLPT scoping template — model APIs, RAG pipelines, MCP servers, embedding stores, agent runtimes",
343
+ "Threat-intelligence inputs do not include AI-discovered zero-day classes (41% of 2025 zero-days were AI-discovered) or AI-augmented offensive TTPs",
344
+ "Provider-side authorisation language for adversarial prompt-injection testing against third-party AI providers is unaddressed — many AI providers' acceptable-use policies prohibit adversarial testing without separate negotiation",
345
+ "TLPT-tester certifications do not yet include AI/MCP-specific competencies (prompt injection, RAG poisoning, agent escape)"
346
+ ],
347
+ "real_requirement": "ITS-TLPT must add: (1) AI/MCP asset enumeration in the scoping template, (2) AI-augmented threat intelligence inputs (ATLAS TTPs, AI-discovered CVE classes), (3) standard authorisation clauses for adversarial testing against third-party AI providers, (4) AI/MCP competency requirements for TLPT-tester certifications, (5) cross-walk to TIBER-EU + UK CBEST + AU CORIE updated scope language.",
348
+ "status": "open",
349
+ "opened_date": "2026-05-15",
350
+ "evidence_cves": [
351
+ "CVE-2025-53773",
352
+ "CVE-2026-30615"
353
+ ],
354
+ "atlas_refs": [
355
+ "AML.T0010",
356
+ "AML.T0051",
357
+ "AML.T0054"
358
+ ],
359
+ "attack_refs": [
360
+ "T1195.001",
361
+ "T1059"
362
+ ]
363
+ },
364
+ "DORA-RTS-Incident-Classification": {
365
+ "framework": "EU DORA (Regulation 2022/2554) — RTS on classification of major ICT-related incidents under Art. 18(3)",
366
+ "control_id": "RTS-Incident-Classification-2024",
367
+ "control_name": "RTS specifying classification criteria for major ICT-related incidents and significant cyber threats (Commission Delegated Regulation (EU) 2024/1772)",
368
+ "designed_for": "Defines the quantitative + qualitative thresholds that promote an ICT incident to 'major' status, triggering the 4h / 24h / 30d notification cascade. Cross-walks to NIS2 Art. 23 incident classification, UK FCA SUP 15.3 operational incident reporting, AU APRA CPS 234, US OCC heightened standards.",
369
+ "misses": [
370
+ "AI-specific incident classes (prompt injection, RAG poisoning, model theft, deepfake-mediated BEC) are not enumerated in the qualitative criteria — operators classify them under generic 'data integrity' / 'service degradation' fields, losing AI-specific severity signal",
371
+ "Quantitative thresholds (clients affected, transactions impacted, recovery duration) presume a transactional ICT service. AI-augmented decision incidents (an LLM emitting incorrect risk advice for hours before detection) don't fit the transaction-count threshold",
372
+ "Reputational impact criteria don't address AI-related public-trust events (model outputting harmful content via prompt injection) with the granularity required",
373
+ "Significant-cyber-threat criteria do not yet contemplate ATLAS-class adversary signal as a trigger for proactive notification"
374
+ ],
375
+ "real_requirement": "RTS classification must add: (1) AI-incident class enumeration in the qualitative criteria, (2) AI-specific quantitative measures (model invocations affected, agent actions taken on injected intent, RAG corpus integrity loss), (3) ATLAS-class adversary indicators as significant-cyber-threat triggers, (4) cross-walk to NIS2 Art. 23 + UK FCA SUP 15.3 + AU CPS 234 with AI-class fields.",
376
+ "status": "open",
377
+ "opened_date": "2026-05-15",
378
+ "evidence_cves": [
379
+ "CVE-2025-53773"
380
+ ],
381
+ "atlas_refs": [
382
+ "AML.T0051",
383
+ "AML.T0054",
384
+ "AML.T0057"
385
+ ],
386
+ "attack_refs": [
387
+ "T1059"
388
+ ]
389
+ },
390
+ "DORA-IA-CTPP-Oversight": {
391
+ "framework": "EU DORA (Regulation 2022/2554) — Implementing Acts for critical-third-party-provider (CTPP) oversight under Art. 31-44",
392
+ "control_id": "IA-CTPP-Oversight-2026",
393
+ "control_name": "Implementing acts designating critical ICT third-party service providers and operationalising the Lead Overseer regime",
394
+ "designed_for": "Establishes the criteria, designation procedure, and Lead Overseer (LO) powers for CTPPs supplying financial entities. First designations expected H2 2026 across hyperscale cloud, network, and core-banking providers. Cross-walks to UK FSMA s.312 critical-third-party regime, AU APRA CPS 230 material service providers, US Treasury TLAC for systemic cloud providers.",
395
+ "misses": [
396
+ "Frontier-AI providers (OpenAI, Anthropic, Google DeepMind, xAI) are functionally critical to many financial entities' workflows but are not on the H2 2026 designation candidate list — their ICT-service taxonomy doesn't map cleanly to the CTPP criteria (concentration, substitutability, criticality of functions supported)",
397
+ "MCP server / agent-runtime providers as CTPPs: no contemplated route to designation despite being in the trust path of every AI-augmented financial workflow",
398
+ "Lead Overseer audit access fields presume conventional cloud audit conventions (SOC2 reports, attestation letters) — frontier-AI providers' model-card / system-card / evaluation-report artifacts have no equivalent treatment",
399
+ "Cross-border LO coordination with UK FCA + AU APRA does not yet cover AI-provider concentration risk"
400
+ ],
401
+ "real_requirement": "CTPP oversight implementing acts must add: (1) frontier-AI provider designation criteria distinct from cloud-provider criteria, (2) MCP/agent-runtime provider class with route to designation when reaching concentration thresholds, (3) Lead Overseer audit framework that includes model cards, system cards, evaluation reports, training-data manifests, (4) UK FCA / AU APRA + EU DORA joint AI-provider oversight protocol.",
402
+ "status": "open",
403
+ "opened_date": "2026-05-15",
404
+ "evidence_cves": [],
405
+ "atlas_refs": [
406
+ "AML.T0010",
407
+ "AML.T0018"
408
+ ],
409
+ "attack_refs": [
410
+ "T1195.001"
411
+ ]
412
+ },
311
413
  "EU-AI-Act-Art-15": {
312
414
  "framework": "EU Artificial Intelligence Act (2024/1689)",
313
415
  "control_id": "Art. 15",
@@ -334,6 +436,100 @@
334
436
  ],
335
437
  "attack_refs": []
336
438
  },
439
+ "EU-AI-Act-Art-53-GPAI": {
440
+ "framework": "EU Artificial Intelligence Act (2024/1689) — General-Purpose AI provider obligations",
441
+ "control_id": "Art. 53",
442
+ "control_name": "Obligations for providers of general-purpose AI (GPAI) models",
443
+ "designed_for": "Providers of general-purpose AI models placed on the EU market. Active 2026-08-02. Requires technical documentation, downstream-provider information package, copyright-policy disclosure, and a summary of training content. Cross-walks to UK AISI voluntary commitments, US NIST AI RMF GPAI profile, OECD AI Principles GPAI annex, ISO/IEC 42001:2023.",
444
+ "misses": [
445
+ "Training-data summary granularity — the prescribed 'sufficiently detailed' standard is operationally undefined; providers can satisfy with sector-level descriptors that defeat copyright/audit traceability",
446
+ "Downstream-provider information package contemplates documentation handoff but not runtime telemetry — a downstream provider integrating a GPAI cannot verify the production model is the documented model",
447
+ "Copyright-policy disclosure does not require attestation against specific corpora (text, image, code) — operators face Art. 53 compliance without resolving the upstream rightsholder question",
448
+ "No technical mechanism prescribed for the training-content summary to be machine-verifiable (no SLSA-equivalent, no signed manifest)"
449
+ ],
450
+ "real_requirement": "Art. 53 implementation must add: (1) machine-readable training-data-summary schema with corpus-level granularity sufficient for copyright audit, (2) signed downstream-provider documentation bound to the production model fingerprint, (3) per-corpus copyright-policy attestation distinct from generic policy disclosure, (4) cross-walk to ISO/IEC 42001 audit evidence + NIST AI RMF GPAI profile.",
451
+ "status": "open",
452
+ "opened_date": "2026-05-15",
453
+ "evidence_cves": [],
454
+ "atlas_refs": [
455
+ "AML.T0010",
456
+ "AML.T0018",
457
+ "AML.T0020"
458
+ ],
459
+ "attack_refs": []
460
+ },
461
+ "EU-AI-Act-Art-55-Systemic": {
462
+ "framework": "EU Artificial Intelligence Act (2024/1689) — GPAI with systemic risk",
463
+ "control_id": "Art. 55",
464
+ "control_name": "Additional obligations for providers of GPAI models with systemic risk",
465
+ "designed_for": "Providers of GPAI models presumed to have systemic risk (cumulative training compute ≥ 10^25 FLOPs benchmark; AI Office may designate other models). Active 2026-08-02. Requires model evaluation including adversarial testing, systemic-risk assessment + mitigation, serious-incident reporting to AI Office + national authorities, and energy/cybersecurity protection at the model layer. Cross-walks to UK AISI safety evaluations, US AISI consortium, NIST AI RMF systemic-risk profile.",
466
+ "misses": [
467
+ "Adversarial-evaluation methodology is not prescribed — providers self-define the red-team scope, leaving prompt-injection coverage, agentic-task exploitation, RAG-poisoning resistance, and MCP-trust scenarios at provider discretion",
468
+ "Energy-consumption reporting cadence + units of measurement are not standardised — comparison across providers is operationally impossible",
469
+ "Serious-incident reporting clock (15-day initial / report-without-undue-delay) does not align with DORA's 4h or NIS2's 24h — financial-entity operators using a systemic GPAI face conflicting clocks",
470
+ "Cybersecurity protection at the model layer (weights, fine-tune adapters, system prompts) has no concrete control catalogue — Art. 55(1)(d) is the most operationally underspecified obligation in the Act"
471
+ ],
472
+ "real_requirement": "Art. 55 operationalisation must add: (1) prescribed adversarial-evaluation methodology covering OWASP LLM Top 10 + ATLAS TTPs + MCP-trust scenarios, (2) standardised energy reporting (kWh per million tokens, training compute under ISO/IEC TR 24028), (3) reconciled incident-reporting clocks with DORA Art. 19 + NIS2 Art. 23, (4) explicit control catalogue for model-layer cybersecurity (weights provenance, system-prompt integrity, fine-tune access control).",
473
+ "status": "open",
474
+ "opened_date": "2026-05-15",
475
+ "evidence_cves": [
476
+ "CVE-2025-53773",
477
+ "CVE-2026-30615"
478
+ ],
479
+ "atlas_refs": [
480
+ "AML.T0010",
481
+ "AML.T0018",
482
+ "AML.T0020",
483
+ "AML.T0051",
484
+ "AML.T0054"
485
+ ],
486
+ "attack_refs": [
487
+ "T1059"
488
+ ]
489
+ },
490
+ "EU-AI-Act-Annex-IX-Conformity": {
491
+ "framework": "EU Artificial Intelligence Act (2024/1689) — Annex IX conformity assessment",
492
+ "control_id": "Annex IX",
493
+ "control_name": "Conformity assessment based on internal control or notified body assessment for high-risk AI systems",
494
+ "designed_for": "Sets the conformity-assessment route for high-risk AI systems (Art. 43). Internal control (Annex VI) suffices for most providers; notified-body assessment (Annex VII) applies to specific Annex III categories. Active 2026-08-02 for high-risk obligations. Cross-walks to EU CRA Annex VIII conformity, EU MDR clinical-AI conformity, UK MHRA AI-as-a-Medical-Device, AU TGA Software-as-Medical-Device.",
495
+ "misses": [
496
+ "Internal-control conformity assessment is self-attestation — there is no third-party verification of Art. 9 risk management, Art. 10 data governance, Art. 15 cybersecurity claims for most high-risk AI",
497
+ "Notified-body capacity is constrained — the small number of designated notified bodies (under 30 across the Union as of 2026-Q2) creates assessment-queue risk that operators cannot mitigate",
498
+ "Conformity reassessment after substantial modification is undefined operationally — fine-tuning, retrieval-augmentation, or system-prompt change triggers conformity-renewal uncertainty",
499
+ "No cross-walk between Annex IX and EU CRA Annex VIII for products that are both AI systems and products-with-digital-elements — dual-track conformity creates duplicate audit + drift risk"
500
+ ],
501
+ "real_requirement": "Annex IX implementation must add: (1) third-party sample audit of internal-control attestations (e.g. risk-based annual sampling by AI Office), (2) notified-body scope expansion + capacity guarantees, (3) operational definition of 'substantial modification' for fine-tuning / RAG / system-prompt changes, (4) joint Annex IX + CRA Annex VIII conformity track for dual-status products.",
502
+ "status": "open",
503
+ "opened_date": "2026-05-15",
504
+ "evidence_cves": [],
505
+ "atlas_refs": [
506
+ "AML.T0010",
507
+ "AML.T0018"
508
+ ],
509
+ "attack_refs": []
510
+ },
511
+ "EU-AI-Act-GPAI-CoP": {
512
+ "framework": "EU Artificial Intelligence Act (2024/1689) — Code of Practice for GPAI",
513
+ "control_id": "GPAI-CoP-2026",
514
+ "control_name": "Code of Practice for general-purpose AI (signed 2026-02; presumed-compliance route for Art. 53 + 55)",
515
+ "designed_for": "Voluntary code (drafted by AI Office working groups) that, when followed, provides a presumption of compliance with Art. 53 + 55 until harmonised standards are published. Signed by major GPAI providers 2026-02. Cross-walks to ISO/IEC 42001:2023 (companion standard), UK AISI voluntary commitments, US NIST AI RMF GPAI profile.",
516
+ "misses": [
517
+ "Voluntary-code legal status: non-signatories must demonstrate Art. 53 / 55 compliance through alternative means with no defined evidentiary standard",
518
+ "Code does not bind the AI Office on enforcement discretion — a signatory operator following the Code can still face investigation if the AI Office considers the Code itself insufficient for a specific case",
519
+ "Cross-jurisdiction recognition: UK + US AI safety institutes have not formally cross-recognised the Code, so an operator producing the same documentation for AI Office + UK AISI + US AISI faces format-divergence overhead",
520
+ "Code sunsets when harmonised standards under Art. 40 are published — operators investing in Code-conformant tooling face a re-implementation cliff at the standards-publication date"
521
+ ],
522
+ "real_requirement": "GPAI Code-of-Practice path must add: (1) defined evidentiary equivalence for non-signatory compliance, (2) AI-Office commitment on enforcement deference for code-conformant signatories, (3) joint AI Office + UK AISI + US AISI common-format recognition, (4) transition plan when Art. 40 harmonised standards supersede the Code.",
523
+ "status": "open",
524
+ "opened_date": "2026-05-15",
525
+ "evidence_cves": [],
526
+ "atlas_refs": [
527
+ "AML.T0010",
528
+ "AML.T0018",
529
+ "AML.T0020"
530
+ ],
531
+ "attack_refs": []
532
+ },
337
533
  "EU-CRA-Art13": {
338
534
  "framework": "EU Cyber Resilience Act (2024/2847)",
339
535
  "control_id": "Art. 13",
@@ -413,6 +609,112 @@
413
609
  "T1530"
414
610
  ]
415
611
  },
612
+ "HIPAA-Security-Rule-2026-NPRM-164.308": {
613
+ "framework": "HIPAA Security Rule (45 CFR § 164.308) — 2026 Notice of Proposed Rulemaking",
614
+ "control_id": "164.308-NPRM",
615
+ "control_name": "Proposed expansion of administrative safeguards (2026 NPRM, expected final rule Q3 2026)",
616
+ "designed_for": "Administrative safeguards: security management process, workforce training, contingency planning, evaluation. NPRM (HHS-OCR-0945-AA82, published 2024-12-27) proposes expansions: mandatory written security plan reviewed at least annually, mandatory technology asset inventory, mandatory network map, mandatory documented contingency / incident-response procedure with tabletop exercises, mandatory authentication-related risk analysis. Cross-walks to NIST 800-66r2, ISO 27799, EU GDPR Art. 32.",
617
+ "misses": [
618
+ "AI assistants in healthcare workflows (ambient scribes, coding assistants, decision support) are not enumerated in the proposed technology-asset-inventory categories — operators will inventory EHRs + workstations but not the AI providers handling PHI",
619
+ "Network map requirement is silent on AI-API egress paths — a complete network map under the NPRM can still omit the model-provider endpoints that PHI flows to",
620
+ "Tabletop-exercise scope does not require AI-specific incident scenarios (prompt injection extracting PHI, RAG poisoning corrupting clinical recommendations)",
621
+ "Workforce-training mandate does not specifically require training on AI-handling of PHI; covered entities can satisfy with generic security training"
622
+ ],
623
+ "real_requirement": "164.308 NPRM implementation must add: (1) AI assistants + model-API providers as enumerated technology-asset categories, (2) network-map requirement extended to AI-API egress including BAA / training-opt-out attestation per route, (3) tabletop-exercise catalogue covering AI-specific PHI loss scenarios, (4) workforce training module specific to AI handling of PHI. Note: final rule still pending — track HHS-OCR publication date Q3 2026.",
624
+ "status": "open",
625
+ "opened_date": "2026-05-15",
626
+ "evidence_cves": [
627
+ "CVE-2025-53773"
628
+ ],
629
+ "atlas_refs": [
630
+ "AML.T0054",
631
+ "AML.T0096"
632
+ ],
633
+ "attack_refs": [
634
+ "T1071",
635
+ "T1530"
636
+ ]
637
+ },
638
+ "HIPAA-Security-Rule-2026-NPRM-164.310": {
639
+ "framework": "HIPAA Security Rule (45 CFR § 164.310) — 2026 Notice of Proposed Rulemaking",
640
+ "control_id": "164.310-NPRM",
641
+ "control_name": "Proposed expansion of physical safeguards including network-access logging (2026 NPRM)",
642
+ "designed_for": "Physical safeguards: facility access controls, workstation security, device + media controls. NPRM proposes a network-access logging mandate for all systems handling ePHI plus deployed-asset inventory + media-disposal verification. Cross-walks to NIST 800-66r2, AU My Health Records Act, UK NHS DSPT.",
643
+ "misses": [
644
+ "Network-access logging mandate is silent on AI-API session logs — a covered entity satisfying the rule with EHR audit logs can still have unrecorded PHI flowing to AI providers",
645
+ "Workstation security expansion does not address developer endpoints with AI coding assistants installed (which may ingest PHI through ambient inclusion)",
646
+ "Media-disposal verification does not contemplate AI training-data residency — PHI shared with an AI provider for in-context inference may persist in their training-eligibility set absent explicit opt-out",
647
+ "Deployed-asset inventory does not require MCP-server enumeration on developer / clinician endpoints"
648
+ ],
649
+ "real_requirement": "164.310 NPRM implementation must add: (1) AI-API session logging treated as in-scope under the network-access-logging mandate, (2) developer-endpoint workstation security extended to AI assistants with PHI exposure, (3) media-disposal verification extended to AI training-data opt-out attestation, (4) MCP-server enumeration in the deployed-asset inventory. Final rule pending.",
650
+ "status": "open",
651
+ "opened_date": "2026-05-15",
652
+ "evidence_cves": [
653
+ "CVE-2026-30615"
654
+ ],
655
+ "atlas_refs": [
656
+ "AML.T0010",
657
+ "AML.T0054"
658
+ ],
659
+ "attack_refs": [
660
+ "T1071"
661
+ ]
662
+ },
663
+ "HIPAA-Security-Rule-2026-NPRM-164.312": {
664
+ "framework": "HIPAA Security Rule (45 CFR § 164.312) — 2026 Notice of Proposed Rulemaking",
665
+ "control_id": "164.312-NPRM",
666
+ "control_name": "Proposed technical safeguards: MFA on PHI access, encryption at rest, anti-malware, vulnerability scan + patch schedule (2026 NPRM)",
667
+ "designed_for": "Technical safeguards: access control, audit, integrity, transmission security. NPRM proposes mandatory MFA on all PHI access, mandatory encryption of ePHI at rest, mandatory anti-malware on ePHI-handling systems, mandatory vulnerability scanning every 6 months + patch schedule (critical patches within reasonable time per asset criticality). Cross-walks to NIST 800-66r2, NIST 800-53 SI-2, EU GDPR Art. 32, AU APP 11.",
668
+ "misses": [
669
+ "MFA mandate is silent on AI-agent session authentication — an agent acting on a clinician's behalf can satisfy the MFA gate once and then perform unbounded subsequent PHI access without re-authentication",
670
+ "Encryption-at-rest mandate does not address PHI residing in AI-provider conversation history, vector embeddings, or fine-tune-eligible corpora",
671
+ "Anti-malware mandate is undefined for AI-augmented systems — prompt-injection-driven malicious actions are not 'malware' in the signature-matching sense but produce equivalent harm",
672
+ "Vulnerability-scan cadence (6 months) is exploitation-acceptance for AI-discovered zero-days (41% of 2025 zero-days were AI-discovered, average disclosure-to-PoC under 30 days); patch-schedule language is risk-based without CISA-KEV-class tiering"
673
+ ],
674
+ "real_requirement": "164.312 NPRM implementation must add: (1) per-action MFA-equivalent for AI-agent PHI access (delegated-authority attestation), (2) encryption-at-rest extended to AI-provider artifacts (conversation history, embeddings, fine-tune sets), (3) prompt-injection + RAG-poisoning detection as anti-malware-equivalent for AI-augmented systems, (4) CISA-KEV-class patch tier (< 72h) layered over the 6-month scan cadence. Final rule pending.",
675
+ "status": "open",
676
+ "opened_date": "2026-05-15",
677
+ "evidence_cves": [
678
+ "CVE-2025-53773",
679
+ "CVE-2026-30615",
680
+ "CVE-2026-31431"
681
+ ],
682
+ "atlas_refs": [
683
+ "AML.T0010",
684
+ "AML.T0051",
685
+ "AML.T0054"
686
+ ],
687
+ "attack_refs": [
688
+ "T1059",
689
+ "T1068",
690
+ "T1078"
691
+ ]
692
+ },
693
+ "HIPAA-Security-Rule-2026-NPRM-164.314": {
694
+ "framework": "HIPAA Security Rule (45 CFR § 164.314) — 2026 Notice of Proposed Rulemaking",
695
+ "control_id": "164.314-NPRM",
696
+ "control_name": "Proposed updates to BAA contract requirements (2026 NPRM)",
697
+ "designed_for": "Organizational requirements: business associate agreements (BAAs), requirements for group health plans. NPRM proposes expanded BAA language: annual workforce-training attestation by business associate, breach-notification clock alignment with HIPAA Breach Notification Rule (60-day outer limit), explicit sub-business-associate flow-down, written technical-safeguards attestation by business associate. Cross-walks to NIST 800-66r2, EU GDPR Art. 28 processor agreements, AU APP 11 third-party clauses.",
698
+ "misses": [
699
+ "Sub-business-associate flow-down does not specifically address AI sub-processor chains — an AI provider integrating embedding / vector / fine-tune sub-services produces a deeper subprocessor chain than the BAA template anticipates",
700
+ "Technical-safeguards attestation does not require AI-specific clauses: prompt retention policy, training-opt-out attestation, model-version pinning, AI-incident notification timeline distinct from generic breach notification",
701
+ "Annual training attestation does not contemplate AI-specific PHI handling training for business-associate workforce",
702
+ "60-day breach-notification clock does not align with prompt-leakage detection latency — PHI leaked through prompt-injection may not be detected within the BAA notification window"
703
+ ],
704
+ "real_requirement": "164.314 NPRM implementation must add: (1) AI-sub-processor explicit flow-down template, (2) AI-specific BAA clauses (prompt retention, training opt-out, model version pinning, AI-incident reporting timeline), (3) AI-handling training requirement for business-associate workforce, (4) accelerated notification clock for AI-mediated PHI loss class. Final rule pending.",
705
+ "status": "open",
706
+ "opened_date": "2026-05-15",
707
+ "evidence_cves": [
708
+ "CVE-2025-53773"
709
+ ],
710
+ "atlas_refs": [
711
+ "AML.T0010",
712
+ "AML.T0054"
713
+ ],
714
+ "attack_refs": [
715
+ "T1195.001"
716
+ ]
717
+ },
416
718
  "HITRUST-CSF-v11.4-09.l": {
417
719
  "framework": "HITRUST CSF v11.4",
418
720
  "control_id": "09.l",
@@ -1246,6 +1548,98 @@
1246
1548
  "T1068"
1247
1549
  ]
1248
1550
  },
1551
+ "PCI-DSS-4.0.1-6.4.3": {
1552
+ "framework": "PCI DSS 4.0.1 (effective 2025-03-31 — supersedes 4.0)",
1553
+ "control_id": "6.4.3",
1554
+ "control_name": "Payment-page scripts are managed: script inventory + integrity check + authorisation",
1555
+ "designed_for": "All payment-page scripts (including those served from third-parties) loaded in the consumer browser must be authorised, integrity-monitored, and inventoried. 4.0.1 retained the 4.0 requirement but tightened the script-management language and made the requirement non-best-practice (mandatory for v4.0.1 compliance from 2025-03-31). Cross-walks to OWASP ASVS V14 client-side controls, EU PSD2 SCA-RTS Art. 18 client-side fraud monitoring, UK FCA SCA-RTS.",
1556
+ "misses": [
1557
+ "AI-generated payment-page widgets / chat-commerce embeds — Subresource Integrity (SRI) requires a static hash, but AI-generated dynamic scripts produce per-session content that defeats fixed-hash integrity checking",
1558
+ "Agent-mediated checkout (an AI agent fetching the payment page on behalf of the customer) is silent in the script-management language — the inventory contemplates browser-loaded scripts not agent-fetched ones",
1559
+ "MCP-server-injected helper scripts in developer environments can poison test-mode payment pages without surfacing in production script inventory",
1560
+ "Cross-walk to EU PSD2 SCA-RTS Art. 18 client-side fraud monitoring is not explicit — operators run two parallel monitoring programs without integration"
1561
+ ],
1562
+ "real_requirement": "6.4.3 operationalisation must add: (1) dynamic-content integrity (CSP report-uri + runtime DOM-equivalent hashes for AI-generated payment widgets), (2) agent-mediated checkout treated as in-scope with delegated-authority attestation, (3) MCP-server allowlisting on developer endpoints that touch payment-page test environments, (4) integrated reporting with PSD2 SCA-RTS Art. 18 + UK FCA SCA-RTS.",
1563
+ "status": "open",
1564
+ "opened_date": "2026-05-15",
1565
+ "evidence_cves": [
1566
+ "CVE-2025-53773"
1567
+ ],
1568
+ "atlas_refs": [
1569
+ "AML.T0010",
1570
+ "AML.T0051"
1571
+ ],
1572
+ "attack_refs": [
1573
+ "T1059",
1574
+ "T1195.001"
1575
+ ]
1576
+ },
1577
+ "PCI-DSS-4.0.1-11.6.1": {
1578
+ "framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
1579
+ "control_id": "11.6.1",
1580
+ "control_name": "Change-and-tamper-detection mechanism on payment pages",
1581
+ "designed_for": "Mandatory runtime DOM-integrity monitoring on payment pages: alert on unauthorised modifications to HTTP headers / payment-page content; tamper-detection alerts at least weekly (or based on risk analysis). Cross-walks to OWASP ASVS V14, EU PSD2 SCA-RTS Art. 18.",
1582
+ "misses": [
1583
+ "Tamper-detection-weekly cadence is exploitation-acceptance for Magecart-class threats with public PoC; a Magecart compromise active 6 days before next scheduled scan has cleared millions of transactions",
1584
+ "AI-generated payment-page content (dynamic widgets, personalised messaging) creates baseline noise that suppresses tamper alerts unless the tooling distinguishes legitimate AI variation from malicious modification",
1585
+ "Detection mechanism scope is the consumer browser only — agent-mediated checkout, mobile-app-embedded payment SDKs, kiosk-mode terminals are out of the literal 11.6.1 scope despite being equivalent attack surface",
1586
+ "No required integration with CSP report-uri, no required Reporting API integration — operators run tamper detection alongside CSP reporting without correlated analysis"
1587
+ ],
1588
+ "real_requirement": "11.6.1 implementation must add: (1) continuous (sub-hour) tamper detection for CDE-scoped payment pages, (2) AI-aware baselining that distinguishes legitimate dynamic content from injection, (3) extension to all payment-page-equivalent surfaces (mobile SDK, kiosk, agent-mediated), (4) mandatory CSP report-uri + Reporting API correlation.",
1589
+ "status": "open",
1590
+ "opened_date": "2026-05-15",
1591
+ "evidence_cves": [],
1592
+ "atlas_refs": [
1593
+ "AML.T0051"
1594
+ ],
1595
+ "attack_refs": [
1596
+ "T1059"
1597
+ ]
1598
+ },
1599
+ "PCI-DSS-4.0.1-12.3.3": {
1600
+ "framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
1601
+ "control_id": "12.3.3",
1602
+ "control_name": "Cryptographic cipher suites and protocols inventory + annual review",
1603
+ "designed_for": "Every cipher suite and cryptographic protocol in use must be documented, inventoried with version, and reviewed at least once every 12 months. 4.0.1 retained 4.0 requirement and clarified that the inventory must cover all CDE-touching systems. Cross-walks to NIST SP 800-52r2, NIST SP 800-131A, EU ENISA cryptographic guidelines, UK NCSC cryptographic guidance, ISO/IEC 18033, NIST PQC migration roadmap (FIPS 203/204/205).",
1604
+ "misses": [
1605
+ "Annual cadence is incompatible with PQC migration timeline — NIST FIPS 203/204/205 finalisation (2024-08), CNSA 2.0 hard deadlines (2027-2030), and harvest-now-decrypt-later threat model require quarterly cipher-suite review",
1606
+ "Inventory scope does not explicitly include AI provider TLS termination cipher suites — PHI / cardholder data flowing to AI providers traverses cipher suites the inventory may not capture",
1607
+ "MCP server-to-client TLS configurations are not in the literal CDE perimeter and so are not inventoried, despite carrying delegated authority that can reach CDE systems",
1608
+ "No hybrid-PQC ecosystem readiness check — operators face a CNSA 2.0 (2027 federal, 2030 broader) cliff without a 4.0.1-mandated inventory of hybrid-PQC capability per cipher suite"
1609
+ ],
1610
+ "real_requirement": "12.3.3 implementation must add: (1) quarterly cipher-suite + protocol review (annual is too slow given PQC migration), (2) inventory scope extended to AI-provider egress + MCP-server transports, (3) hybrid-PQC readiness column per cipher suite (X25519+ML-KEM, ECDSA+ML-DSA), (4) cross-walk to NIST PQC migration roadmap + CNSA 2.0 timelines.",
1611
+ "status": "open",
1612
+ "opened_date": "2026-05-15",
1613
+ "evidence_cves": [],
1614
+ "atlas_refs": [],
1615
+ "attack_refs": []
1616
+ },
1617
+ "PCI-DSS-4.0.1-12.10.7": {
1618
+ "framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
1619
+ "control_id": "12.10.7",
1620
+ "control_name": "Incident response procedure for confirmed PAN exposure: escalation, regulator + brand notification, customer notification",
1621
+ "designed_for": "Defined incident-response procedure when PAN (Primary Account Number) is confirmed exposed, including escalation paths, regulator and card-brand notification, and customer-notification language. 4.0.1 retained 4.0 and tightened the escalation-procedure documentation. Cross-walks to EU PSD2 incident reporting, NIS2 Art. 23, UK FCA SUP 15.3, AU APRA CPS 234, NIST SP 800-61r3.",
1622
+ "misses": [
1623
+ "AI-mediated PAN exposure class (prompt injection extracting PAN from a banking copilot's context window; RAG corpus indexing PAN by error) is not in the response-procedure template — operators handle it as a generic exposure with sub-optimal containment",
1624
+ "Notification clock harmonisation: 12.10.7 references card-brand timelines that are not aligned with PSD2 / NIS2 / DORA financial-entity clocks; cross-jurisdiction operators face contradictory deadlines",
1625
+ "Escalation procedure does not require AI-incident sub-classification (model-extraction vs. prompt-injection vs. RAG-corruption) for forensic + remediation routing",
1626
+ "Customer-notification language template does not address AI-mediated exposure (which differs from database-breach exposure operationally — the PAN was leaked to a third-party AI provider, not extracted by an adversary)"
1627
+ ],
1628
+ "real_requirement": "12.10.7 implementation must add: (1) AI-mediated PAN-exposure scenarios in the response-procedure template, (2) notification-clock harmonisation table covering card-brand + PSD2 + NIS2 + DORA + UK FCA + AU CPS 234, (3) AI-incident sub-classification in escalation routing, (4) customer-notification language addressing third-party-AI-provider exposure distinct from adversary exfiltration.",
1629
+ "status": "open",
1630
+ "opened_date": "2026-05-15",
1631
+ "evidence_cves": [
1632
+ "CVE-2025-53773"
1633
+ ],
1634
+ "atlas_refs": [
1635
+ "AML.T0054",
1636
+ "AML.T0096"
1637
+ ],
1638
+ "attack_refs": [
1639
+ "T1071",
1640
+ "T1530"
1641
+ ]
1642
+ },
1249
1643
  "PSD2-RTS-SCA": {
1250
1644
  "framework": "EU PSD2 Regulatory Technical Standards on Strong Customer Authentication (Commission Delegated Regulation (EU) 2018/389)",
1251
1645
  "control_id": "RTS-SCA",
@@ -2,7 +2,7 @@
2
2
  "_meta": {
3
3
  "schema_version": "1.3.0",
4
4
  "version": "1.3.0",
5
- "last_updated": "2026-05-11",
5
+ "last_updated": "2026-05-15",
6
6
  "note": "Multi-jurisdiction framework registry. patch_sla in hours. notification_sla in hours. source field must be primary regulatory source. v1.3.0 expansion: NO, MX, AR, TR, TH, PH, US_CALIFORNIA top-level jurisdictions added; EU member-state sub-regulator blocks added for Germany (BSI), France (ANSSI), Spain (AEPD + AESIA), Italy (ACN + AgID); EU-level technical body ENISA added as cross-cutting reference. v1.2.0 expansion: IL, CH, HK, TW, ID, VN, US_NYDFS added; JP expanded with APPI/PPC, FISC, NISC, METI, Economic Security Promotion Act, AI Strategy Council guidance. v1.1.0 expansion: BR, CN, ZA, AE, SA, NZ, KR, CL added; IN and CA enriched with data-protection law entries (DPDPA, Quebec Law 25, PIPEDA).",
7
7
  "tlp": "CLEAR",
8
8
  "source_confidence": {
@@ -79,7 +79,7 @@
79
79
  },
80
80
  "DORA": {
81
81
  "full_name": "Digital Operational Resilience Act",
82
- "authority": "ESAs (EBA, EIOPA, ESMA)",
82
+ "authority": "ESAs (EBA, EIOPA, ESMA) + Lead Overseers (CTPP regime from H2 2026)",
83
83
  "source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022R2554",
84
84
  "effective_date": "2025-01-17",
85
85
  "version": "2022/2554",
@@ -92,33 +92,55 @@
92
92
  "Art. 9 — ICT risk management framework",
93
93
  "Art. 10 — identification of ICT assets and dependencies",
94
94
  "Art. 11 — ICT business continuity",
95
- "Art. 19 — major incident classification and reporting (4h initial, 24h intermediate, 30d final)",
96
- "Art. 28-30ICT third-party risk (DORA extends to all ICT providers including cloud)"
95
+ "Art. 19 — major incident classification and reporting (4h initial, 24h intermediate, 30d final; classification per Commission Delegated Regulation (EU) 2024/1772)",
96
+ "Art. 26threat-led penetration testing (ITS active 2026-Q3)",
97
+ "Art. 28-30 — ICT third-party risk register (RTS on subcontracting active 2026-01-17)",
98
+ "Art. 31-44 — Critical Third-Party Provider oversight regime (first designations H2 2026)"
99
+ ],
100
+ "implementing_measures_2026": [
101
+ "RTS on subcontracting of ICT services supporting critical or important functions (Commission Delegated Regulation (EU) 2025/420) — active 2026-01-17",
102
+ "RTS on classification of major ICT-related incidents (Commission Delegated Regulation (EU) 2024/1772) — in force",
103
+ "ITS on threat-led penetration testing under Art. 26 — active 2026-Q3",
104
+ "Implementing acts designating critical ICT third-party service providers — first wave H2 2026"
97
105
  ],
98
106
  "framework_gaps": [
99
107
  "Patch SLA not specified — risk-based interpretation required",
100
- "AI/ML systems in scope but no AI-specific controls",
101
- "MCP servers: 'ICT third-party service providers' may apply but no specific guidance",
102
- "PQC: not addressed; 'appropriate level of security' standard"
108
+ "AI/ML systems in scope as ICT third-party service providers; no AI-specific obligations beyond generic ICT-risk language",
109
+ "Frontier-AI providers not on initial CTPP designation candidate list despite material concentration risk",
110
+ "MCP servers + agent runtimes: classifiable as ICT third-party but no specific oversight guidance",
111
+ "PQC: not addressed; 'appropriate level of security' standard",
112
+ "Incident-classification RTS does not enumerate AI-specific incident classes"
103
113
  ],
104
- "ai_coverage": "AI systems providing ICT services to financial entities are in scope as ICT third-party service providers",
114
+ "ai_coverage": "AI systems providing ICT services to financial entities are in scope as ICT third-party service providers; frontier-AI provider designation under the CTPP regime remains open as of 2026-05",
105
115
  "pqc_coverage": "Implicit in Art. 9 risk management; no explicit requirement",
106
- "theater_risk": "low-medium — DORA has strong third-party oversight; patching gap remains"
116
+ "theater_risk": "low-medium — DORA has strong third-party oversight; AI-specific obligations still maturing through 2026 implementing measures"
107
117
  },
108
118
  "EU_AI_ACT": {
109
119
  "full_name": "EU Artificial Intelligence Act",
110
- "authority": "EU AI Office + National Market Surveillance Authorities",
120
+ "authority": "EU AI Office + National Market Surveillance Authorities + Notified Bodies (Annex IX conformity)",
111
121
  "source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024R1689",
112
122
  "effective_date": "2024-08-01",
113
- "full_application_date": "2026-08-01",
123
+ "full_application_date": "2026-08-02",
124
+ "gpai_obligations_date": "2026-08-02",
125
+ "high_risk_obligations_date": "2026-08-02",
126
+ "prohibited_practices_date": "2025-02-02",
114
127
  "version": "2024/1689",
115
- "security_article": "Article 9 — Risk Management System (High-Risk AI)",
128
+ "security_article": "Article 9 — Risk Management System (High-Risk AI); Article 15 — Cybersecurity; Article 55 — GPAI Systemic Risk",
116
129
  "critical_controls": [
130
+ "Art. 5 — prohibited AI practices (in force 2025-02-02)",
117
131
  "Art. 9 — mandatory risk management system for high-risk AI (ongoing, not one-time)",
118
132
  "Art. 10 — data governance requirements for training/validation/testing data",
119
133
  "Art. 12 — technical documentation and logging requirements",
120
134
  "Art. 15 — accuracy, robustness, and cybersecurity requirements for high-risk AI",
121
- "Art. 72GPAI model adversarial testing requirements"
135
+ "Art. 43 + Annex IX conformity assessment route (internal control vs. notified body) for high-risk AI",
136
+ "Art. 53 — GPAI provider obligations: technical documentation, downstream-provider info package, copyright policy, training-content summary (active 2026-08-02)",
137
+ "Art. 55 — GPAI with systemic risk: adversarial evaluation, systemic-risk assessment, serious-incident reporting, cybersecurity of model layer (active 2026-08-02)"
138
+ ],
139
+ "implementing_measures_2026": [
140
+ "GPAI Code of Practice signed 2026-02 — presumed-compliance route for Art. 53 + 55 until harmonised standards published",
141
+ "GPAI obligations full application 2026-08-02",
142
+ "High-risk obligations full application 2026-08-02",
143
+ "Harmonised standards under Art. 40 — CEN-CENELEC JTC 21 deliverables tracked through 2026-2027"
122
144
  ],
123
145
  "high_risk_categories": [
124
146
  "Biometric identification",
@@ -131,13 +153,16 @@
131
153
  ],
132
154
  "framework_gaps": [
133
155
  "Art. 15 'cybersecurity' is undefined — no technical specification",
134
- "Prompt injection not addressed in Art. 15 or implementing measures",
135
- "Supply chain security for GPAI models: Art. 72 adversarial testing but no signing requirements",
136
- "MCP servers/agent tools: not contemplated in implementing regulations"
137
- ],
138
- "ai_coverage": "Specific AI security requirements for high-risk AI and GPAI models — most complete AI security framework globally",
156
+ "Prompt injection not addressed in Art. 15 or current implementing measures",
157
+ "Supply chain security for GPAI models: Art. 55 adversarial evaluation but no signing / SLSA-equivalent requirement",
158
+ "MCP servers/agent tools: not contemplated in implementing regulations",
159
+ "Annex IX internal-control conformity is self-attestation for most high-risk AI; notified-body capacity is constrained",
160
+ "Art. 53 training-content summary granularity is operationally undefined",
161
+ "Art. 55 incident-reporting clock (15-day) misaligned with DORA Art. 19 (4h) and NIS2 Art. 23 (24h)"
162
+ ],
163
+ "ai_coverage": "Specific AI security requirements for high-risk AI and GPAI models — most complete AI security framework globally; GPAI + high-risk obligations active 2026-08-02",
139
164
  "pqc_coverage": "Not addressed",
140
- "theater_risk": "unknownimplementing measures still developing as of 2026-05"
165
+ "theater_risk": "mediumCode of Practice provides presumed-compliance route but adversarial-evaluation methodology + energy-reporting cadence remain provider-defined as of 2026-05"
141
166
  },
142
167
  "EU_CRA": {
143
168
  "full_name": "EU Cyber Resilience Act",