@blamejs/exceptd-skills 0.12.24 → 0.12.26
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +12 -4
- package/CHANGELOG.md +127 -0
- package/data/_indexes/_meta.json +44 -43
- package/data/_indexes/activity-feed.json +54 -47
- package/data/_indexes/catalog-summaries.json +20 -20
- package/data/_indexes/chains.json +561 -6
- package/data/_indexes/currency.json +19 -10
- package/data/_indexes/frequency.json +207 -55
- package/data/_indexes/handoff-dag.json +4 -0
- package/data/_indexes/jurisdiction-clocks.json +2 -2
- package/data/_indexes/jurisdiction-map.json +25 -12
- package/data/_indexes/section-offsets.json +490 -396
- package/data/_indexes/stale-content.json +14 -2
- package/data/_indexes/summary-cards.json +57 -3
- package/data/_indexes/token-budget.json +129 -74
- package/data/_indexes/trigger-table.json +66 -0
- package/data/_indexes/xref.json +58 -8
- package/data/atlas-ttps.json +528 -19
- package/data/attack-techniques.json +198 -84
- package/data/cve-catalog.json +1309 -9
- package/data/exploit-availability.json +300 -10
- package/data/framework-control-gaps.json +557 -1
- package/data/global-frameworks.json +44 -19
- package/data/rfc-references.json +94 -1
- package/data/zeroday-lessons.json +475 -13
- package/lib/schemas/cve-catalog.schema.json +24 -3
- package/manifest-snapshot.json +68 -2
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +145 -59
- package/package.json +1 -1
- package/sbom.cdx.json +7 -7
- package/skills/ai-attack-surface/skill.md +11 -2
- package/skills/ai-c2-detection/skill.md +3 -1
- package/skills/ai-risk-management/skill.md +3 -1
- package/skills/api-security/skill.md +4 -0
- package/skills/attack-surface-pentest/skill.md +1 -0
- package/skills/container-runtime-security/skill.md +3 -1
- package/skills/dlp-gap-analysis/skill.md +1 -1
- package/skills/exploit-scoring/skill.md +2 -2
- package/skills/incident-response-playbook/skill.md +1 -1
- package/skills/kernel-lpe-triage/skill.md +6 -1
- package/skills/mcp-agent-trust/skill.md +7 -2
- package/skills/mlops-security/skill.md +1 -1
- package/skills/rag-pipeline-security/skill.md +4 -2
- package/skills/sector-financial/skill.md +1 -1
- package/skills/sector-telecom/skill.md +259 -0
- package/skills/skill-update-loop/skill.md +1 -1
- package/skills/supply-chain-integrity/skill.md +3 -1
- package/skills/threat-model-currency/skill.md +1 -1
- package/skills/webapp-security/skill.md +2 -0
- package/skills/zeroday-gap-learn/skill.md +2 -2
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
"_meta": {
|
|
3
3
|
"schema_version": "1.3.0",
|
|
4
4
|
"version": "1.3.0",
|
|
5
|
-
"last_updated": "2026-05-
|
|
5
|
+
"last_updated": "2026-05-15",
|
|
6
6
|
"note": "Multi-jurisdiction framework registry. patch_sla in hours. notification_sla in hours. source field must be primary regulatory source. v1.3.0 expansion: NO, MX, AR, TR, TH, PH, US_CALIFORNIA top-level jurisdictions added; EU member-state sub-regulator blocks added for Germany (BSI), France (ANSSI), Spain (AEPD + AESIA), Italy (ACN + AgID); EU-level technical body ENISA added as cross-cutting reference. v1.2.0 expansion: IL, CH, HK, TW, ID, VN, US_NYDFS added; JP expanded with APPI/PPC, FISC, NISC, METI, Economic Security Promotion Act, AI Strategy Council guidance. v1.1.0 expansion: BR, CN, ZA, AE, SA, NZ, KR, CL added; IN and CA enriched with data-protection law entries (DPDPA, Quebec Law 25, PIPEDA).",
|
|
7
7
|
"tlp": "CLEAR",
|
|
8
8
|
"source_confidence": {
|
|
@@ -79,7 +79,7 @@
|
|
|
79
79
|
},
|
|
80
80
|
"DORA": {
|
|
81
81
|
"full_name": "Digital Operational Resilience Act",
|
|
82
|
-
"authority": "ESAs (EBA, EIOPA, ESMA)",
|
|
82
|
+
"authority": "ESAs (EBA, EIOPA, ESMA) + Lead Overseers (CTPP regime from H2 2026)",
|
|
83
83
|
"source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022R2554",
|
|
84
84
|
"effective_date": "2025-01-17",
|
|
85
85
|
"version": "2022/2554",
|
|
@@ -92,33 +92,55 @@
|
|
|
92
92
|
"Art. 9 — ICT risk management framework",
|
|
93
93
|
"Art. 10 — identification of ICT assets and dependencies",
|
|
94
94
|
"Art. 11 — ICT business continuity",
|
|
95
|
-
"Art. 19 — major incident classification and reporting (4h initial, 24h intermediate, 30d final)",
|
|
96
|
-
"Art.
|
|
95
|
+
"Art. 19 — major incident classification and reporting (4h initial, 24h intermediate, 30d final; classification per Commission Delegated Regulation (EU) 2024/1772)",
|
|
96
|
+
"Art. 26 — threat-led penetration testing (ITS active 2026-Q3)",
|
|
97
|
+
"Art. 28-30 — ICT third-party risk register (RTS on subcontracting active 2026-01-17)",
|
|
98
|
+
"Art. 31-44 — Critical Third-Party Provider oversight regime (first designations H2 2026)"
|
|
99
|
+
],
|
|
100
|
+
"implementing_measures_2026": [
|
|
101
|
+
"RTS on subcontracting of ICT services supporting critical or important functions (Commission Delegated Regulation (EU) 2025/420) — active 2026-01-17",
|
|
102
|
+
"RTS on classification of major ICT-related incidents (Commission Delegated Regulation (EU) 2024/1772) — in force",
|
|
103
|
+
"ITS on threat-led penetration testing under Art. 26 — active 2026-Q3",
|
|
104
|
+
"Implementing acts designating critical ICT third-party service providers — first wave H2 2026"
|
|
97
105
|
],
|
|
98
106
|
"framework_gaps": [
|
|
99
107
|
"Patch SLA not specified — risk-based interpretation required",
|
|
100
|
-
"AI/ML systems in scope
|
|
101
|
-
"
|
|
102
|
-
"
|
|
108
|
+
"AI/ML systems in scope as ICT third-party service providers; no AI-specific obligations beyond generic ICT-risk language",
|
|
109
|
+
"Frontier-AI providers not on initial CTPP designation candidate list despite material concentration risk",
|
|
110
|
+
"MCP servers + agent runtimes: classifiable as ICT third-party but no specific oversight guidance",
|
|
111
|
+
"PQC: not addressed; 'appropriate level of security' standard",
|
|
112
|
+
"Incident-classification RTS does not enumerate AI-specific incident classes"
|
|
103
113
|
],
|
|
104
|
-
"ai_coverage": "AI systems providing ICT services to financial entities are in scope as ICT third-party service providers",
|
|
114
|
+
"ai_coverage": "AI systems providing ICT services to financial entities are in scope as ICT third-party service providers; frontier-AI provider designation under the CTPP regime remains open as of 2026-05",
|
|
105
115
|
"pqc_coverage": "Implicit in Art. 9 risk management; no explicit requirement",
|
|
106
|
-
"theater_risk": "low-medium — DORA has strong third-party oversight;
|
|
116
|
+
"theater_risk": "low-medium — DORA has strong third-party oversight; AI-specific obligations still maturing through 2026 implementing measures"
|
|
107
117
|
},
|
|
108
118
|
"EU_AI_ACT": {
|
|
109
119
|
"full_name": "EU Artificial Intelligence Act",
|
|
110
|
-
"authority": "EU AI Office + National Market Surveillance Authorities",
|
|
120
|
+
"authority": "EU AI Office + National Market Surveillance Authorities + Notified Bodies (Annex IX conformity)",
|
|
111
121
|
"source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024R1689",
|
|
112
122
|
"effective_date": "2024-08-01",
|
|
113
|
-
"full_application_date": "2026-08-
|
|
123
|
+
"full_application_date": "2026-08-02",
|
|
124
|
+
"gpai_obligations_date": "2026-08-02",
|
|
125
|
+
"high_risk_obligations_date": "2026-08-02",
|
|
126
|
+
"prohibited_practices_date": "2025-02-02",
|
|
114
127
|
"version": "2024/1689",
|
|
115
|
-
"security_article": "Article 9 — Risk Management System (High-Risk AI)",
|
|
128
|
+
"security_article": "Article 9 — Risk Management System (High-Risk AI); Article 15 — Cybersecurity; Article 55 — GPAI Systemic Risk",
|
|
116
129
|
"critical_controls": [
|
|
130
|
+
"Art. 5 — prohibited AI practices (in force 2025-02-02)",
|
|
117
131
|
"Art. 9 — mandatory risk management system for high-risk AI (ongoing, not one-time)",
|
|
118
132
|
"Art. 10 — data governance requirements for training/validation/testing data",
|
|
119
133
|
"Art. 12 — technical documentation and logging requirements",
|
|
120
134
|
"Art. 15 — accuracy, robustness, and cybersecurity requirements for high-risk AI",
|
|
121
|
-
"Art.
|
|
135
|
+
"Art. 43 + Annex IX — conformity assessment route (internal control vs. notified body) for high-risk AI",
|
|
136
|
+
"Art. 53 — GPAI provider obligations: technical documentation, downstream-provider info package, copyright policy, training-content summary (active 2026-08-02)",
|
|
137
|
+
"Art. 55 — GPAI with systemic risk: adversarial evaluation, systemic-risk assessment, serious-incident reporting, cybersecurity of model layer (active 2026-08-02)"
|
|
138
|
+
],
|
|
139
|
+
"implementing_measures_2026": [
|
|
140
|
+
"GPAI Code of Practice signed 2026-02 — presumed-compliance route for Art. 53 + 55 until harmonised standards published",
|
|
141
|
+
"GPAI obligations full application 2026-08-02",
|
|
142
|
+
"High-risk obligations full application 2026-08-02",
|
|
143
|
+
"Harmonised standards under Art. 40 — CEN-CENELEC JTC 21 deliverables tracked through 2026-2027"
|
|
122
144
|
],
|
|
123
145
|
"high_risk_categories": [
|
|
124
146
|
"Biometric identification",
|
|
@@ -131,13 +153,16 @@
|
|
|
131
153
|
],
|
|
132
154
|
"framework_gaps": [
|
|
133
155
|
"Art. 15 'cybersecurity' is undefined — no technical specification",
|
|
134
|
-
"Prompt injection not addressed in Art. 15 or implementing measures",
|
|
135
|
-
"Supply chain security for GPAI models: Art.
|
|
136
|
-
"MCP servers/agent tools: not contemplated in implementing regulations"
|
|
137
|
-
|
|
138
|
-
|
|
156
|
+
"Prompt injection not addressed in Art. 15 or current implementing measures",
|
|
157
|
+
"Supply chain security for GPAI models: Art. 55 adversarial evaluation but no signing / SLSA-equivalent requirement",
|
|
158
|
+
"MCP servers/agent tools: not contemplated in implementing regulations",
|
|
159
|
+
"Annex IX internal-control conformity is self-attestation for most high-risk AI; notified-body capacity is constrained",
|
|
160
|
+
"Art. 53 training-content summary granularity is operationally undefined",
|
|
161
|
+
"Art. 55 incident-reporting clock (15-day) misaligned with DORA Art. 19 (4h) and NIS2 Art. 23 (24h)"
|
|
162
|
+
],
|
|
163
|
+
"ai_coverage": "Specific AI security requirements for high-risk AI and GPAI models — most complete AI security framework globally; GPAI + high-risk obligations active 2026-08-02",
|
|
139
164
|
"pqc_coverage": "Not addressed",
|
|
140
|
-
"theater_risk": "
|
|
165
|
+
"theater_risk": "medium — Code of Practice provides presumed-compliance route but adversarial-evaluation methodology + energy-reporting cadence remain provider-defined as of 2026-05"
|
|
141
166
|
},
|
|
142
167
|
"EU_CRA": {
|
|
143
168
|
"full_name": "EU Cyber Resilience Act",
|
package/data/rfc-references.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"_meta": {
|
|
3
3
|
"schema_version": "1.0.0",
|
|
4
|
-
"last_updated": "2026-05-
|
|
4
|
+
"last_updated": "2026-05-15",
|
|
5
5
|
"note": "IETF RFCs and Internet-Drafts that exceptd skills depend on. RFCs are the layer beneath compliance frameworks: a control like 'TLS 1.3 required' implicitly references RFC 8446; a 'use strong KEM' control depends on whatever draft-ietf-tls-ecdhe-mlkem settles into. Frameworks lag RFCs; RFCs lag attacker innovation. This catalog tracks both kinds of lag.",
|
|
6
6
|
"status_values": [
|
|
7
7
|
"Internet Standard",
|
|
@@ -161,6 +161,19 @@
|
|
|
161
161
|
],
|
|
162
162
|
"last_verified": "2026-05-11"
|
|
163
163
|
},
|
|
164
|
+
"RFC-7644": {
|
|
165
|
+
"number": 7644,
|
|
166
|
+
"title": "System for Cross-domain Identity Management (SCIM) 2.0: Protocol",
|
|
167
|
+
"status": "Proposed Standard",
|
|
168
|
+
"published": "2015-09",
|
|
169
|
+
"tracker": "https://www.rfc-editor.org/info/rfc7644",
|
|
170
|
+
"relevance": "SCIM 2.0 is the dominant standard for federated identity-store synchronisation between IdPs and downstream applications (Okta, Entra ID, Workday → SaaS). Operator-facing: SCIM endpoints are a recurring credential-store soft target — bearer-token misconfigurations expose full directory enumeration + write access. AI-agent contexts add a new class: agent-identity provisioning at scale via SCIM, where over-broad attribute filters expose human identity data to agent-tenants. Pair with RFC 7643 (SCIM Schema) when implementing.",
|
|
171
|
+
"skills_referencing": [
|
|
172
|
+
"identity-assurance",
|
|
173
|
+
"cred-stores"
|
|
174
|
+
],
|
|
175
|
+
"last_verified": "2026-05-15"
|
|
176
|
+
},
|
|
164
177
|
"RFC-7970": {
|
|
165
178
|
"number": 7970,
|
|
166
179
|
"title": "The Incident Object Description Exchange Format Version 2",
|
|
@@ -217,6 +230,18 @@
|
|
|
217
230
|
],
|
|
218
231
|
"last_verified": "2026-05-11"
|
|
219
232
|
},
|
|
233
|
+
"RFC-8460": {
|
|
234
|
+
"number": 8460,
|
|
235
|
+
"title": "SMTP TLS Reporting (TLSRPT)",
|
|
236
|
+
"status": "Proposed Standard",
|
|
237
|
+
"published": "2018-09",
|
|
238
|
+
"tracker": "https://www.rfc-editor.org/info/rfc8460",
|
|
239
|
+
"relevance": "Defines a DNS-published TLSRPT policy and an aggregate-reporting mechanism (RUA endpoint) where receiving MTAs report success / failure of inbound TLS negotiation. Operator-facing: TLSRPT is the monitoring half of the MTA-STS pair (RFC 8461) — without it, an MTA-STS `enforce` policy silently degrades when downgrade attempts occur or receiver-side TLS configurations break. Phishing-defense relevance is indirect but load-bearing: visibility into STARTTLS-stripping attempts is otherwise absent.",
|
|
240
|
+
"skills_referencing": [
|
|
241
|
+
"email-security-anti-phishing"
|
|
242
|
+
],
|
|
243
|
+
"last_verified": "2026-05-15"
|
|
244
|
+
},
|
|
220
245
|
"RFC-8461": {
|
|
221
246
|
"number": 8461,
|
|
222
247
|
"title": "SMTP MTA Strict Transport Security (MTA-STS)",
|
|
@@ -241,6 +266,31 @@
|
|
|
241
266
|
],
|
|
242
267
|
"last_verified": "2026-05-13"
|
|
243
268
|
},
|
|
269
|
+
"RFC-8617": {
|
|
270
|
+
"number": 8617,
|
|
271
|
+
"title": "The Authenticated Received Chain (ARC) Protocol",
|
|
272
|
+
"status": "Experimental",
|
|
273
|
+
"published": "2019-07",
|
|
274
|
+
"tracker": "https://www.rfc-editor.org/info/rfc8617",
|
|
275
|
+
"relevance": "ARC preserves authentication results across legitimate forwarding paths (mailing lists, alias services) where SPF + DKIM alignment would otherwise break, producing false DMARC failures. Operator-facing: ARC is the load-bearing complement to DMARC for organisations that receive mail via forwarders — anti-phishing programs that publish `p=reject` without an ARC strategy face increased false-positive bounce rates that pressure operators to relax DMARC. The skill-update-loop tracks ARC adoption signals as a forward-watch indicator for email-authentication posture changes.",
|
|
276
|
+
"skills_referencing": [
|
|
277
|
+
"email-security-anti-phishing",
|
|
278
|
+
"skill-update-loop"
|
|
279
|
+
],
|
|
280
|
+
"last_verified": "2026-05-15"
|
|
281
|
+
},
|
|
282
|
+
"RFC-8705": {
|
|
283
|
+
"number": 8705,
|
|
284
|
+
"title": "OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens",
|
|
285
|
+
"status": "Proposed Standard",
|
|
286
|
+
"published": "2020-02",
|
|
287
|
+
"tracker": "https://www.rfc-editor.org/info/rfc8705",
|
|
288
|
+
"relevance": "Defines two mechanisms: mTLS client authentication to OAuth authorisation servers, and certificate-bound access tokens that prevent token theft from being exploitable without the original mTLS client certificate. Operator-facing: mTLS-bound tokens are the canonical mitigation for bearer-token theft in high-assurance contexts (open-banking under PSD2 / UK FCA SCA-RTS, FAPI 2.0, government SSO). DPoP (RFC 9449) is the lighter-weight alternative for browser / mobile contexts where client TLS certificates are impractical.",
|
|
289
|
+
"skills_referencing": [
|
|
290
|
+
"identity-assurance"
|
|
291
|
+
],
|
|
292
|
+
"last_verified": "2026-05-15"
|
|
293
|
+
},
|
|
244
294
|
"RFC-8725": {
|
|
245
295
|
"number": 8725,
|
|
246
296
|
"title": "JSON Web Token Best Current Practices",
|
|
@@ -285,6 +335,22 @@
|
|
|
285
335
|
],
|
|
286
336
|
"last_verified": "2026-05-11"
|
|
287
337
|
},
|
|
338
|
+
"RFC-9112": {
|
|
339
|
+
"number": 9112,
|
|
340
|
+
"title": "HTTP/1.1",
|
|
341
|
+
"status": "Internet Standard",
|
|
342
|
+
"published": "2022-06",
|
|
343
|
+
"std_number": 99,
|
|
344
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9112",
|
|
345
|
+
"relevance": "The current authoritative HTTP/1.1 specification, supersedes RFC 7230. Operator-facing: every HTTP/1.1 deployment — including MCP server transports, AI-API client libraries, and legacy webapp middle-tiers — should reference RFC 9112 rather than the older RFC 7230. Re-specification clarified request/response framing in ways that affect smuggling-class attack surfaces (CL.TE / TE.CL / CL.CL desync) which remain the dominant HTTP/1.1 vulnerability class.",
|
|
346
|
+
"lag_notes": "Supersedes RFC 7230. Many security-tool rulesets still cite the obsolete number; check any control mapping that references 'RFC 7230' as the HTTP/1.1 authority and update to 9112.",
|
|
347
|
+
"skills_referencing": [
|
|
348
|
+
"api-security",
|
|
349
|
+
"webapp-security",
|
|
350
|
+
"mcp-agent-trust"
|
|
351
|
+
],
|
|
352
|
+
"last_verified": "2026-05-15"
|
|
353
|
+
},
|
|
288
354
|
"RFC-9114": {
|
|
289
355
|
"number": 9114,
|
|
290
356
|
"title": "HTTP/3",
|
|
@@ -361,6 +427,19 @@
|
|
|
361
427
|
],
|
|
362
428
|
"last_verified": "2026-05-11"
|
|
363
429
|
},
|
|
430
|
+
"RFC-9449": {
|
|
431
|
+
"number": 9449,
|
|
432
|
+
"title": "OAuth 2.0 Demonstrating Proof of Possession (DPoP)",
|
|
433
|
+
"status": "Proposed Standard",
|
|
434
|
+
"published": "2023-09",
|
|
435
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9449",
|
|
436
|
+
"relevance": "DPoP binds OAuth access + refresh tokens to a client-held key pair via per-request JWTs, defending against bearer-token theft in contexts where mTLS (RFC 8705) is impractical (single-page apps, mobile apps, AI-agent runtimes lacking client-certificate infrastructure). Operator-facing: DPoP is the recommended sender-constraint for FAPI 2.0 + MCP server-to-client OAuth flows where the client cannot present a TLS client certificate. Pairs with RFC 9700 (OAuth 2.0 Security BCP) recommendations.",
|
|
437
|
+
"skills_referencing": [
|
|
438
|
+
"identity-assurance",
|
|
439
|
+
"api-security"
|
|
440
|
+
],
|
|
441
|
+
"last_verified": "2026-05-15"
|
|
442
|
+
},
|
|
364
443
|
"RFC-9458": {
|
|
365
444
|
"number": 9458,
|
|
366
445
|
"title": "Oblivious HTTP",
|
|
@@ -375,6 +454,20 @@
|
|
|
375
454
|
],
|
|
376
455
|
"last_verified": "2026-05-11"
|
|
377
456
|
},
|
|
457
|
+
"RFC-9622": {
|
|
458
|
+
"number": 9622,
|
|
459
|
+
"title": "An Architecture for Transport Services",
|
|
460
|
+
"status": "Proposed Standard",
|
|
461
|
+
"published": "2024-08",
|
|
462
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9622",
|
|
463
|
+
"relevance": "Transport Services (TAPS) architecture — abstracts the choice of underlying transport (TCP, QUIC, SCTP) behind a unified API that selects the protocol at runtime based on path conditions. Forward-watch relevance: webapp / AI-API client libraries that adopt TAPS may transparently shift between TCP-HTTP/2 and QUIC-HTTP/3 mid-session, complicating boundary inspection assumptions that pin to a single transport. Currently tracked as a deployment-watch item rather than an operational control point.",
|
|
464
|
+
"lag_notes": "Architecture document; companion documents (TAPS implementation, TAPS programming interface) are still in progress at IETF TAPS WG. Enterprise tooling impact is forward-looking.",
|
|
465
|
+
"skills_referencing": [
|
|
466
|
+
"webapp-security",
|
|
467
|
+
"sector-telecom"
|
|
468
|
+
],
|
|
469
|
+
"last_verified": "2026-05-15"
|
|
470
|
+
},
|
|
378
471
|
"RFC-9700": {
|
|
379
472
|
"number": 9700,
|
|
380
473
|
"title": "Best Current Practice for OAuth 2.0 Security",
|