@blamejs/exceptd-skills 0.12.25 → 0.12.26
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +44 -0
- package/data/_indexes/_meta.json +19 -18
- package/data/_indexes/activity-feed.json +11 -4
- package/data/_indexes/catalog-summaries.json +4 -4
- package/data/_indexes/chains.json +241 -6
- package/data/_indexes/currency.json +10 -1
- package/data/_indexes/frequency.json +170 -55
- package/data/_indexes/handoff-dag.json +4 -0
- package/data/_indexes/jurisdiction-map.json +23 -12
- package/data/_indexes/section-offsets.json +94 -0
- package/data/_indexes/stale-content.json +14 -2
- package/data/_indexes/summary-cards.json +54 -0
- package/data/_indexes/token-budget.json +58 -3
- package/data/_indexes/trigger-table.json +66 -0
- package/data/_indexes/xref.json +58 -8
- package/data/atlas-ttps.json +37 -0
- package/data/framework-control-gaps.json +162 -0
- package/data/rfc-references.json +2 -1
- package/manifest-snapshot.json +68 -2
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +126 -40
- package/package.json +1 -1
- package/sbom.cdx.json +7 -7
- package/skills/sector-telecom/skill.md +259 -0
|
@@ -3165,6 +3165,100 @@
|
|
|
3165
3165
|
}
|
|
3166
3166
|
]
|
|
3167
3167
|
},
|
|
3168
|
+
"sector-telecom": {
|
|
3169
|
+
"path": "skills/sector-telecom/skill.md",
|
|
3170
|
+
"total_bytes": 20782,
|
|
3171
|
+
"total_lines": 260,
|
|
3172
|
+
"frontmatter": {
|
|
3173
|
+
"line_start": 1,
|
|
3174
|
+
"line_end": 74,
|
|
3175
|
+
"byte_start": 0,
|
|
3176
|
+
"byte_end": 1909
|
|
3177
|
+
},
|
|
3178
|
+
"sections": [
|
|
3179
|
+
{
|
|
3180
|
+
"name": "Threat Context (mid-2026)",
|
|
3181
|
+
"normalized_name": "threat-context",
|
|
3182
|
+
"line": 76,
|
|
3183
|
+
"byte_start": 1910,
|
|
3184
|
+
"byte_end": 5098,
|
|
3185
|
+
"bytes": 3188,
|
|
3186
|
+
"h3_count": 0
|
|
3187
|
+
},
|
|
3188
|
+
{
|
|
3189
|
+
"name": "Framework Lag Declaration",
|
|
3190
|
+
"normalized_name": "framework-lag-declaration",
|
|
3191
|
+
"line": 90,
|
|
3192
|
+
"byte_start": 5098,
|
|
3193
|
+
"byte_end": 7180,
|
|
3194
|
+
"bytes": 2082,
|
|
3195
|
+
"h3_count": 0
|
|
3196
|
+
},
|
|
3197
|
+
{
|
|
3198
|
+
"name": "TTP Mapping",
|
|
3199
|
+
"normalized_name": "ttp-mapping",
|
|
3200
|
+
"line": 94,
|
|
3201
|
+
"byte_start": 7180,
|
|
3202
|
+
"byte_end": 8614,
|
|
3203
|
+
"bytes": 1434,
|
|
3204
|
+
"h3_count": 0
|
|
3205
|
+
},
|
|
3206
|
+
{
|
|
3207
|
+
"name": "Exploit Availability Matrix",
|
|
3208
|
+
"normalized_name": "exploit-availability-matrix",
|
|
3209
|
+
"line": 108,
|
|
3210
|
+
"byte_start": 8614,
|
|
3211
|
+
"byte_end": 9808,
|
|
3212
|
+
"bytes": 1194,
|
|
3213
|
+
"h3_count": 0
|
|
3214
|
+
},
|
|
3215
|
+
{
|
|
3216
|
+
"name": "Analysis Procedure",
|
|
3217
|
+
"normalized_name": "analysis-procedure",
|
|
3218
|
+
"line": 121,
|
|
3219
|
+
"byte_start": 9808,
|
|
3220
|
+
"byte_end": 15637,
|
|
3221
|
+
"bytes": 5829,
|
|
3222
|
+
"h3_count": 7
|
|
3223
|
+
},
|
|
3224
|
+
{
|
|
3225
|
+
"name": "Output Format",
|
|
3226
|
+
"normalized_name": "output-format",
|
|
3227
|
+
"line": 183,
|
|
3228
|
+
"byte_start": 15637,
|
|
3229
|
+
"byte_end": 17152,
|
|
3230
|
+
"bytes": 1515,
|
|
3231
|
+
"h3_count": 0
|
|
3232
|
+
},
|
|
3233
|
+
{
|
|
3234
|
+
"name": "Compliance Theater Check",
|
|
3235
|
+
"normalized_name": "compliance-theater-check",
|
|
3236
|
+
"line": 231,
|
|
3237
|
+
"byte_start": 17152,
|
|
3238
|
+
"byte_end": 19359,
|
|
3239
|
+
"bytes": 2207,
|
|
3240
|
+
"h3_count": 0
|
|
3241
|
+
},
|
|
3242
|
+
{
|
|
3243
|
+
"name": "Defensive Countermeasure Mapping",
|
|
3244
|
+
"normalized_name": "defensive-countermeasure-mapping",
|
|
3245
|
+
"line": 243,
|
|
3246
|
+
"byte_start": 19359,
|
|
3247
|
+
"byte_end": 20110,
|
|
3248
|
+
"bytes": 751,
|
|
3249
|
+
"h3_count": 0
|
|
3250
|
+
},
|
|
3251
|
+
{
|
|
3252
|
+
"name": "Hand-Off / Related Skills",
|
|
3253
|
+
"normalized_name": "hand-off",
|
|
3254
|
+
"line": 253,
|
|
3255
|
+
"byte_start": 20110,
|
|
3256
|
+
"byte_end": 20782,
|
|
3257
|
+
"bytes": 672,
|
|
3258
|
+
"h3_count": 0
|
|
3259
|
+
}
|
|
3260
|
+
]
|
|
3261
|
+
},
|
|
3168
3262
|
"api-security": {
|
|
3169
3263
|
"path": "skills/api-security/skill.md",
|
|
3170
3264
|
"total_bytes": 35524,
|
|
@@ -3,19 +3,31 @@
|
|
|
3
3
|
"schema_version": "1.0.0",
|
|
4
4
|
"reference_date": "2026-05-01",
|
|
5
5
|
"note": "Stale-content snapshot derived from audit-cross-skill checks. Re-runs of build-indexes against the same inputs produce byte-identical output (reference_date is manifest.threat_review_date, not 'now'). audit-cross-skill.js remains the canonical interactive audit.",
|
|
6
|
-
"finding_count":
|
|
6
|
+
"finding_count": 3,
|
|
7
7
|
"by_severity": {
|
|
8
8
|
"high": 0,
|
|
9
|
-
"medium":
|
|
9
|
+
"medium": 3,
|
|
10
10
|
"low": 0
|
|
11
11
|
}
|
|
12
12
|
},
|
|
13
13
|
"findings": [
|
|
14
|
+
{
|
|
15
|
+
"severity": "medium",
|
|
16
|
+
"category": "badge_drift",
|
|
17
|
+
"artifact": "README.md",
|
|
18
|
+
"detail": "skills badge shows 38, manifest has 39"
|
|
19
|
+
},
|
|
14
20
|
{
|
|
15
21
|
"severity": "medium",
|
|
16
22
|
"category": "badge_drift",
|
|
17
23
|
"artifact": "README.md",
|
|
18
24
|
"detail": "jurisdictions badge shows 35, live count is 34"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"severity": "medium",
|
|
28
|
+
"category": "researcher_claim_drift",
|
|
29
|
+
"artifact": "skills/researcher/skill.md",
|
|
30
|
+
"detail": "claims 37 specialized skills downstream; live count is 38"
|
|
19
31
|
}
|
|
20
32
|
]
|
|
21
33
|
}
|
|
@@ -1351,6 +1351,60 @@
|
|
|
1351
1351
|
"supply-chain-integrity"
|
|
1352
1352
|
]
|
|
1353
1353
|
},
|
|
1354
|
+
"sector-telecom": {
|
|
1355
|
+
"description": "Telecom and 5G security for mid-2026 — Salt Typhoon, Volt Typhoon, CALEA / IPA-LI gateway compromise, signaling-protocol abuse (SS7 / Diameter / GTP), 5G N6 / N9 isolation, gNB / DU / CU integrity, OEM-equipment supply-chain compromise, AI-RAN / O-RAN security",
|
|
1356
|
+
"threat_context_excerpt": "**Salt Typhoon (China nation-state; PRC Ministry of State Security nexus).** The 2024–2026 campaign — disclosed in successive Five Eyes joint advisories from October 2024 onward (CISA / NSA / FBI joint product reissued through 2025–2026) — compromised at least nine US carriers (publicly named: AT&T, Verizon, T-Mobile US, Lumen, Charter, Cox, Windstream, Consolidated, plus undisclosed others) and extended to AU / CA / NZ / UK Tier-1 carriers. Threat actor TTPs map to T1199 (Trusted Relationship) via OEM vendor supply chain, T1098 (Account Manipulation) for persistent admin access on NMS, and ...",
|
|
1357
|
+
"produces": "The investigation evidence bundle returned by phase 5 + 6 has this shape:\n\n```json\n{\n \"session_id\": \"telecom-<iso>\",\n \"playbook_id\": \"sector-telecom\",\n \"classification\": \"detected | clean | not_detected | inconclusive\",\n \"evidence_hash\": \"sha256:...\",\n \"telecom_specific_findings\": {\n \"li_gateway_audit\": {\n \"anomalous_activations\": 0,\n \"activations_outside_ticket\": 0,\n \"outbound_tunnel_to_non_allowlist_ip\": 0\n },\n \"gnb_attestation_state\": {\n \"expected_hashes_compared\": 0,\n \"drifted_basestations\": [],\n \"downgrade_events\": 0\n },\n \"signaling_anomal ...",
|
|
1358
|
+
"key_xrefs": {
|
|
1359
|
+
"cwe_refs": [
|
|
1360
|
+
"CWE-287",
|
|
1361
|
+
"CWE-306",
|
|
1362
|
+
"CWE-918"
|
|
1363
|
+
],
|
|
1364
|
+
"d3fend_refs": [
|
|
1365
|
+
"D3-NTA",
|
|
1366
|
+
"D3-NTPM",
|
|
1367
|
+
"D3-IOPR",
|
|
1368
|
+
"D3-NI"
|
|
1369
|
+
],
|
|
1370
|
+
"framework_gaps": [
|
|
1371
|
+
"FCC-CPNI-4.1",
|
|
1372
|
+
"FCC-Cyber-Incident-Notification-2024",
|
|
1373
|
+
"NIS2-Annex-I-Telecom",
|
|
1374
|
+
"DORA-Art-21-Telecom-ICT",
|
|
1375
|
+
"UK-CAF-B5",
|
|
1376
|
+
"AU-ISM-1556",
|
|
1377
|
+
"GSMA-NESAS-Deployment",
|
|
1378
|
+
"3GPP-TR-33.926",
|
|
1379
|
+
"ITU-T-X.805"
|
|
1380
|
+
],
|
|
1381
|
+
"atlas_refs": [
|
|
1382
|
+
"AML.T0040"
|
|
1383
|
+
],
|
|
1384
|
+
"attack_refs": [
|
|
1385
|
+
"T1071",
|
|
1386
|
+
"T1078",
|
|
1387
|
+
"T1098",
|
|
1388
|
+
"T1190",
|
|
1389
|
+
"T1199",
|
|
1390
|
+
"T1556"
|
|
1391
|
+
],
|
|
1392
|
+
"rfc_refs": [
|
|
1393
|
+
"RFC-9622"
|
|
1394
|
+
],
|
|
1395
|
+
"dlp_refs": []
|
|
1396
|
+
},
|
|
1397
|
+
"trigger_count": 22,
|
|
1398
|
+
"atlas_count": 1,
|
|
1399
|
+
"attack_count": 6,
|
|
1400
|
+
"framework_gap_count": 9,
|
|
1401
|
+
"cwe_count": 3,
|
|
1402
|
+
"d3fend_count": 4,
|
|
1403
|
+
"rfc_count": 1,
|
|
1404
|
+
"last_threat_review": "2026-05-15",
|
|
1405
|
+
"path": "skills/sector-telecom/skill.md",
|
|
1406
|
+
"handoff_targets": []
|
|
1407
|
+
},
|
|
1354
1408
|
"api-security": {
|
|
1355
1409
|
"description": "API security for mid-2026 — OWASP API Top 10 2023, AI-API specific (rate limits, prompt-shape egress, MCP HTTP transport), GraphQL + gRPC + REST + WebSocket attack surfaces, API gateway posture, BOLA/BFLA/SSRF/Mass Assignment",
|
|
1356
1410
|
"threat_context_excerpt": "APIs are now the integration substrate of every non-trivial system. The mid-2026 enterprise app is a thin shell of UI calling a fan-out of REST, GraphQL, gRPC, and WebSocket APIs — many of which themselves call **AI-API services** (OpenAI, Anthropic, Google Gemini, AWS Bedrock, Azure OpenAI) on the user's behalf. Legacy web-application firewalls were built for HTML form posts and inspect REST badly, GraphQL barely, gRPC binary framing not at all, and AI-API egress not at all. The defensive perimeter has moved from the WAF to the **API gateway and the egress policy**.",
|
|
@@ -3,9 +3,9 @@
|
|
|
3
3
|
"schema_version": "1.0.0",
|
|
4
4
|
"tokenizer_note": "Character-density approximation: 1 token ≈ 4 chars. This is the canonical rule-of-thumb for OpenAI tokenizers on English+technical text. Claude's tokenizer is typically more efficient on prose; treat this as an upper-bound budget for both. Consumers with stricter precision needs should re-tokenize with their own tokenizer.",
|
|
5
5
|
"approx_chars_per_token": 4,
|
|
6
|
-
"total_chars":
|
|
7
|
-
"total_approx_tokens":
|
|
8
|
-
"skill_count":
|
|
6
|
+
"total_chars": 1450921,
|
|
7
|
+
"total_approx_tokens": 362735,
|
|
8
|
+
"skill_count": 39
|
|
9
9
|
},
|
|
10
10
|
"skills": {
|
|
11
11
|
"kernel-lpe-triage": {
|
|
@@ -1843,6 +1843,61 @@
|
|
|
1843
1843
|
}
|
|
1844
1844
|
}
|
|
1845
1845
|
},
|
|
1846
|
+
"sector-telecom": {
|
|
1847
|
+
"path": "skills/sector-telecom/skill.md",
|
|
1848
|
+
"bytes": 20782,
|
|
1849
|
+
"chars": 20682,
|
|
1850
|
+
"lines": 260,
|
|
1851
|
+
"approx_tokens": 5171,
|
|
1852
|
+
"approx_chars_per_token": 4,
|
|
1853
|
+
"sections": {
|
|
1854
|
+
"threat-context": {
|
|
1855
|
+
"bytes": 3188,
|
|
1856
|
+
"chars": 3174,
|
|
1857
|
+
"approx_tokens": 794
|
|
1858
|
+
},
|
|
1859
|
+
"framework-lag-declaration": {
|
|
1860
|
+
"bytes": 2082,
|
|
1861
|
+
"chars": 2080,
|
|
1862
|
+
"approx_tokens": 520
|
|
1863
|
+
},
|
|
1864
|
+
"ttp-mapping": {
|
|
1865
|
+
"bytes": 1434,
|
|
1866
|
+
"chars": 1422,
|
|
1867
|
+
"approx_tokens": 356
|
|
1868
|
+
},
|
|
1869
|
+
"exploit-availability-matrix": {
|
|
1870
|
+
"bytes": 1194,
|
|
1871
|
+
"chars": 1194,
|
|
1872
|
+
"approx_tokens": 299
|
|
1873
|
+
},
|
|
1874
|
+
"analysis-procedure": {
|
|
1875
|
+
"bytes": 5829,
|
|
1876
|
+
"chars": 5773,
|
|
1877
|
+
"approx_tokens": 1443
|
|
1878
|
+
},
|
|
1879
|
+
"output-format": {
|
|
1880
|
+
"bytes": 1515,
|
|
1881
|
+
"chars": 1515,
|
|
1882
|
+
"approx_tokens": 379
|
|
1883
|
+
},
|
|
1884
|
+
"compliance-theater-check": {
|
|
1885
|
+
"bytes": 2207,
|
|
1886
|
+
"chars": 2203,
|
|
1887
|
+
"approx_tokens": 551
|
|
1888
|
+
},
|
|
1889
|
+
"defensive-countermeasure-mapping": {
|
|
1890
|
+
"bytes": 751,
|
|
1891
|
+
"chars": 751,
|
|
1892
|
+
"approx_tokens": 188
|
|
1893
|
+
},
|
|
1894
|
+
"hand-off": {
|
|
1895
|
+
"bytes": 672,
|
|
1896
|
+
"chars": 662,
|
|
1897
|
+
"approx_tokens": 166
|
|
1898
|
+
}
|
|
1899
|
+
}
|
|
1900
|
+
},
|
|
1846
1901
|
"api-security": {
|
|
1847
1902
|
"path": "skills/api-security/skill.md",
|
|
1848
1903
|
"bytes": 35524,
|
|
@@ -1046,6 +1046,72 @@
|
|
|
1046
1046
|
"smart meter security": [
|
|
1047
1047
|
"sector-energy"
|
|
1048
1048
|
],
|
|
1049
|
+
"telecom security": [
|
|
1050
|
+
"sector-telecom"
|
|
1051
|
+
],
|
|
1052
|
+
"5g core": [
|
|
1053
|
+
"sector-telecom"
|
|
1054
|
+
],
|
|
1055
|
+
"salt typhoon": [
|
|
1056
|
+
"sector-telecom"
|
|
1057
|
+
],
|
|
1058
|
+
"volt typhoon": [
|
|
1059
|
+
"sector-telecom"
|
|
1060
|
+
],
|
|
1061
|
+
"gnb integrity": [
|
|
1062
|
+
"sector-telecom"
|
|
1063
|
+
],
|
|
1064
|
+
"lawful intercept": [
|
|
1065
|
+
"sector-telecom"
|
|
1066
|
+
],
|
|
1067
|
+
"calea": [
|
|
1068
|
+
"sector-telecom"
|
|
1069
|
+
],
|
|
1070
|
+
"fcc cpni": [
|
|
1071
|
+
"sector-telecom"
|
|
1072
|
+
],
|
|
1073
|
+
"4-business-day notification": [
|
|
1074
|
+
"sector-telecom"
|
|
1075
|
+
],
|
|
1076
|
+
"gsma nesas": [
|
|
1077
|
+
"sector-telecom"
|
|
1078
|
+
],
|
|
1079
|
+
"ss7": [
|
|
1080
|
+
"sector-telecom"
|
|
1081
|
+
],
|
|
1082
|
+
"diameter": [
|
|
1083
|
+
"sector-telecom"
|
|
1084
|
+
],
|
|
1085
|
+
"gtp": [
|
|
1086
|
+
"sector-telecom"
|
|
1087
|
+
],
|
|
1088
|
+
"3gpp ts 33.501": [
|
|
1089
|
+
"sector-telecom"
|
|
1090
|
+
],
|
|
1091
|
+
"3gpp tr 33.926": [
|
|
1092
|
+
"sector-telecom"
|
|
1093
|
+
],
|
|
1094
|
+
"o-ran": [
|
|
1095
|
+
"sector-telecom"
|
|
1096
|
+
],
|
|
1097
|
+
"n6 n9 isolation": [
|
|
1098
|
+
"sector-telecom"
|
|
1099
|
+
],
|
|
1100
|
+
"nis2 annex i": [
|
|
1101
|
+
"sector-telecom"
|
|
1102
|
+
],
|
|
1103
|
+
"uk tsa 2021": [
|
|
1104
|
+
"sector-telecom"
|
|
1105
|
+
],
|
|
1106
|
+
"au soci": [
|
|
1107
|
+
"sector-telecom"
|
|
1108
|
+
],
|
|
1109
|
+
"tssr": [
|
|
1110
|
+
"sector-telecom"
|
|
1111
|
+
],
|
|
1112
|
+
"itu-t x.805": [
|
|
1113
|
+
"sector-telecom"
|
|
1114
|
+
],
|
|
1049
1115
|
"api security": [
|
|
1050
1116
|
"api-security"
|
|
1051
1117
|
],
|
package/data/_indexes/xref.json
CHANGED
|
@@ -72,6 +72,7 @@
|
|
|
72
72
|
"api-security",
|
|
73
73
|
"attack-surface-pentest",
|
|
74
74
|
"mcp-agent-trust",
|
|
75
|
+
"sector-telecom",
|
|
75
76
|
"webapp-security"
|
|
76
77
|
],
|
|
77
78
|
"CWE-1395": [
|
|
@@ -154,12 +155,14 @@
|
|
|
154
155
|
"sector-energy",
|
|
155
156
|
"sector-financial",
|
|
156
157
|
"sector-healthcare",
|
|
158
|
+
"sector-telecom",
|
|
157
159
|
"webapp-security"
|
|
158
160
|
],
|
|
159
161
|
"CWE-306": [
|
|
160
162
|
"identity-assurance",
|
|
161
163
|
"ot-ics-security",
|
|
162
|
-
"sector-energy"
|
|
164
|
+
"sector-energy",
|
|
165
|
+
"sector-telecom"
|
|
163
166
|
],
|
|
164
167
|
"CWE-798": [
|
|
165
168
|
"cloud-security",
|
|
@@ -217,7 +220,8 @@
|
|
|
217
220
|
"defensive-countermeasure-mapping",
|
|
218
221
|
"dlp-gap-analysis",
|
|
219
222
|
"fuzz-testing-strategy",
|
|
220
|
-
"rag-pipeline-security"
|
|
223
|
+
"rag-pipeline-security",
|
|
224
|
+
"sector-telecom"
|
|
221
225
|
],
|
|
222
226
|
"D3-NTA": [
|
|
223
227
|
"ai-attack-surface",
|
|
@@ -225,7 +229,8 @@
|
|
|
225
229
|
"attack-surface-pentest",
|
|
226
230
|
"defensive-countermeasure-mapping",
|
|
227
231
|
"dlp-gap-analysis",
|
|
228
|
-
"rag-pipeline-security"
|
|
232
|
+
"rag-pipeline-security",
|
|
233
|
+
"sector-telecom"
|
|
229
234
|
],
|
|
230
235
|
"D3-CBAN": [
|
|
231
236
|
"defensive-countermeasure-mapping",
|
|
@@ -259,12 +264,14 @@
|
|
|
259
264
|
],
|
|
260
265
|
"D3-NI": [
|
|
261
266
|
"ai-c2-detection",
|
|
262
|
-
"defensive-countermeasure-mapping"
|
|
267
|
+
"defensive-countermeasure-mapping",
|
|
268
|
+
"sector-telecom"
|
|
263
269
|
],
|
|
264
270
|
"D3-NTPM": [
|
|
265
271
|
"ai-c2-detection",
|
|
266
272
|
"defensive-countermeasure-mapping",
|
|
267
|
-
"dlp-gap-analysis"
|
|
273
|
+
"dlp-gap-analysis",
|
|
274
|
+
"sector-telecom"
|
|
268
275
|
],
|
|
269
276
|
"D3-FE": [
|
|
270
277
|
"defensive-countermeasure-mapping",
|
|
@@ -511,6 +518,33 @@
|
|
|
511
518
|
"NERC-CIP-007-6-R4": [
|
|
512
519
|
"ot-ics-security",
|
|
513
520
|
"sector-energy"
|
|
521
|
+
],
|
|
522
|
+
"FCC-CPNI-4.1": [
|
|
523
|
+
"sector-telecom"
|
|
524
|
+
],
|
|
525
|
+
"FCC-Cyber-Incident-Notification-2024": [
|
|
526
|
+
"sector-telecom"
|
|
527
|
+
],
|
|
528
|
+
"NIS2-Annex-I-Telecom": [
|
|
529
|
+
"sector-telecom"
|
|
530
|
+
],
|
|
531
|
+
"DORA-Art-21-Telecom-ICT": [
|
|
532
|
+
"sector-telecom"
|
|
533
|
+
],
|
|
534
|
+
"UK-CAF-B5": [
|
|
535
|
+
"sector-telecom"
|
|
536
|
+
],
|
|
537
|
+
"AU-ISM-1556": [
|
|
538
|
+
"sector-telecom"
|
|
539
|
+
],
|
|
540
|
+
"GSMA-NESAS-Deployment": [
|
|
541
|
+
"sector-telecom"
|
|
542
|
+
],
|
|
543
|
+
"3GPP-TR-33.926": [
|
|
544
|
+
"sector-telecom"
|
|
545
|
+
],
|
|
546
|
+
"ITU-T-X.805": [
|
|
547
|
+
"sector-telecom"
|
|
514
548
|
]
|
|
515
549
|
},
|
|
516
550
|
"atlas_refs": {
|
|
@@ -580,6 +614,9 @@
|
|
|
580
614
|
"mlops-security",
|
|
581
615
|
"ot-ics-security",
|
|
582
616
|
"supply-chain-integrity"
|
|
617
|
+
],
|
|
618
|
+
"AML.T0040": [
|
|
619
|
+
"sector-telecom"
|
|
583
620
|
]
|
|
584
621
|
},
|
|
585
622
|
"attack_refs": {
|
|
@@ -613,6 +650,7 @@
|
|
|
613
650
|
"sector-energy",
|
|
614
651
|
"sector-federal-government",
|
|
615
652
|
"sector-financial",
|
|
653
|
+
"sector-telecom",
|
|
616
654
|
"webapp-security"
|
|
617
655
|
],
|
|
618
656
|
"T1195.001": [
|
|
@@ -626,7 +664,8 @@
|
|
|
626
664
|
"rag-pipeline-security"
|
|
627
665
|
],
|
|
628
666
|
"T1071": [
|
|
629
|
-
"ai-c2-detection"
|
|
667
|
+
"ai-c2-detection",
|
|
668
|
+
"sector-telecom"
|
|
630
669
|
],
|
|
631
670
|
"T1102": [
|
|
632
671
|
"ai-c2-detection"
|
|
@@ -647,7 +686,8 @@
|
|
|
647
686
|
"incident-response-playbook",
|
|
648
687
|
"sector-energy",
|
|
649
688
|
"sector-financial",
|
|
650
|
-
"sector-healthcare"
|
|
689
|
+
"sector-healthcare",
|
|
690
|
+
"sector-telecom"
|
|
651
691
|
],
|
|
652
692
|
"T1567": [
|
|
653
693
|
"age-gates-child-safety",
|
|
@@ -677,7 +717,8 @@
|
|
|
677
717
|
"supply-chain-integrity"
|
|
678
718
|
],
|
|
679
719
|
"T1556": [
|
|
680
|
-
"identity-assurance"
|
|
720
|
+
"identity-assurance",
|
|
721
|
+
"sector-telecom"
|
|
681
722
|
],
|
|
682
723
|
"T1110": [
|
|
683
724
|
"identity-assurance"
|
|
@@ -697,6 +738,12 @@
|
|
|
697
738
|
"incident-response-playbook",
|
|
698
739
|
"sector-financial"
|
|
699
740
|
],
|
|
741
|
+
"T1098": [
|
|
742
|
+
"sector-telecom"
|
|
743
|
+
],
|
|
744
|
+
"T1199": [
|
|
745
|
+
"sector-telecom"
|
|
746
|
+
],
|
|
700
747
|
"T1552": [
|
|
701
748
|
"cloud-security"
|
|
702
749
|
],
|
|
@@ -812,6 +859,9 @@
|
|
|
812
859
|
],
|
|
813
860
|
"RFC-9106": [
|
|
814
861
|
"pqc-first"
|
|
862
|
+
],
|
|
863
|
+
"RFC-9622": [
|
|
864
|
+
"sector-telecom"
|
|
815
865
|
]
|
|
816
866
|
},
|
|
817
867
|
"dlp_refs": {}
|
package/data/atlas-ttps.json
CHANGED
|
@@ -53,6 +53,43 @@
|
|
|
53
53
|
],
|
|
54
54
|
"last_verified": "2026-05-15"
|
|
55
55
|
},
|
|
56
|
+
"AML.T0040": {
|
|
57
|
+
"id": "AML.T0040",
|
|
58
|
+
"name": "Tool / Plugin Compromise",
|
|
59
|
+
"tactic": "Execution",
|
|
60
|
+
"description": "Adversary compromises an LLM tool-call surface or agent plugin layer — for example an MCP server, a tool registered with an OpenAI Codex / Anthropic Claude Code session, or a Copilot / Cursor agent plugin — to gain code execution within the agent runtime. The compromised tool exposes operator-controlled inputs (filesystem paths, shell commands, API endpoints) that the LLM invokes on behalf of the operator, bypassing the operator-side trust boundary.",
|
|
61
|
+
"subtechniques": [
|
|
62
|
+
"AML.T0040.000 — MCP server typosquat / registry compromise",
|
|
63
|
+
"AML.T0040.001 — Agent plugin authorization bypass via prompt-injection-induced consent",
|
|
64
|
+
"AML.T0040.002 — Stdio-transport command injection (Anthropic MCP SDK class)"
|
|
65
|
+
],
|
|
66
|
+
"real_world_instances": [
|
|
67
|
+
"CVE-2026-30623 (Anthropic MCP SDK stdio command-injection class — 30+ MCP servers affected)",
|
|
68
|
+
"Pwn2Own Berlin 2026 — Viettel Cyber Security Claude Code collision (MCP-class bug)",
|
|
69
|
+
"Pwn2Own Berlin 2026 — STARLabs SG five-bug LM Studio chain",
|
|
70
|
+
"Pwn2Own Berlin 2026 — Compass Security OpenAI Codex CWE-150 chain"
|
|
71
|
+
],
|
|
72
|
+
"framework_gap": true,
|
|
73
|
+
"framework_gap_detail": "No framework currently models the agent-runtime tool-call trust boundary. NIST 800-53 CM-7 (Least Functionality) was designed for OS-level execution allowlisting, not for AI-agent tool registries. ISO 27001:2022 A.5.20 (Information security in supplier relationships) does not reach plugin-level supplier identity in the agent runtime. The MCP-server-registry surface is closest analogue to a package registry; supply-chain controls (SLSA, sigstore) are not yet applied to MCP registries operationally.",
|
|
74
|
+
"controls_that_partially_help": [
|
|
75
|
+
"NIST-800-53-CM-7",
|
|
76
|
+
"NIST-800-53-AC-3",
|
|
77
|
+
"ISO-27001-2022-A.8.30"
|
|
78
|
+
],
|
|
79
|
+
"controls_that_dont_help": [
|
|
80
|
+
"Traditional WAF / API gateway controls — agent-side calls bypass these by design",
|
|
81
|
+
"OS-level antimalware — the agent runtime invokes the tool inside its own process trust boundary"
|
|
82
|
+
],
|
|
83
|
+
"detection": "MCP-server inventory + signature attestation; tool-call audit logs reviewed for typosquat patterns; agent-side outbound API call monitoring for credential exfiltration patterns; plugin-installation event correlation with prompt-injection IOCs.",
|
|
84
|
+
"exceptd_skills": [
|
|
85
|
+
"mcp-agent-trust",
|
|
86
|
+
"ai-attack-surface",
|
|
87
|
+
"mcp-supply-chain"
|
|
88
|
+
],
|
|
89
|
+
"secure_ai_v2_layer": true,
|
|
90
|
+
"maturity": "high",
|
|
91
|
+
"last_verified": "2026-05-15"
|
|
92
|
+
},
|
|
56
93
|
"AML.T0010": {
|
|
57
94
|
"id": "AML.T0010",
|
|
58
95
|
"name": "ML Supply Chain Compromise",
|