@blamejs/exceptd-skills 0.12.25 → 0.12.26
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +44 -0
- package/data/_indexes/_meta.json +19 -18
- package/data/_indexes/activity-feed.json +11 -4
- package/data/_indexes/catalog-summaries.json +4 -4
- package/data/_indexes/chains.json +241 -6
- package/data/_indexes/currency.json +10 -1
- package/data/_indexes/frequency.json +170 -55
- package/data/_indexes/handoff-dag.json +4 -0
- package/data/_indexes/jurisdiction-map.json +23 -12
- package/data/_indexes/section-offsets.json +94 -0
- package/data/_indexes/stale-content.json +14 -2
- package/data/_indexes/summary-cards.json +54 -0
- package/data/_indexes/token-budget.json +58 -3
- package/data/_indexes/trigger-table.json +66 -0
- package/data/_indexes/xref.json +58 -8
- package/data/atlas-ttps.json +37 -0
- package/data/framework-control-gaps.json +162 -0
- package/data/rfc-references.json +2 -1
- package/manifest-snapshot.json +68 -2
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +126 -40
- package/package.json +1 -1
- package/sbom.cdx.json +7 -7
- package/skills/sector-telecom/skill.md +259 -0
|
@@ -1964,5 +1964,167 @@
|
|
|
1964
1964
|
"attack_refs": [
|
|
1965
1965
|
"T1195.001"
|
|
1966
1966
|
]
|
|
1967
|
+
},
|
|
1968
|
+
"FCC-CPNI-4.1": {
|
|
1969
|
+
"framework": "FCC-CPNI",
|
|
1970
|
+
"control_id": "47-CFR-64.2009(e)",
|
|
1971
|
+
"control_name": "CPNI Annual Certification + Operational Compliance",
|
|
1972
|
+
"designed_for": "Annual certification by US telecom carriers that they have established operating procedures to comply with CPNI rules; covers customer-proprietary network info disclosure to law enforcement and third parties.",
|
|
1973
|
+
"misses": [
|
|
1974
|
+
"Lawful-intercept (LI) gateway compromise detection — CPNI rules predate Salt Typhoon-class adversary access to CALEA-mandated systems",
|
|
1975
|
+
"Anomalous LI activation requests from compromised admin accounts",
|
|
1976
|
+
"Cross-PLMN signaling spike detection (SS7 / Diameter / GTP)",
|
|
1977
|
+
"OEM firmware drift attestation on equipment that touches CPNI flows"
|
|
1978
|
+
],
|
|
1979
|
+
"real_requirement": "Annual CPNI certification PLUS quarterly LI-gateway activation audit (PRC / Salt-Typhoon-class threat model), gNB firmware hash attestation, signaling-anomaly baselines per PLMN-pair.",
|
|
1980
|
+
"status": "open",
|
|
1981
|
+
"opened_date": "2026-05-15",
|
|
1982
|
+
"evidence_cves": [],
|
|
1983
|
+
"atlas_refs": ["AML.T0040"],
|
|
1984
|
+
"attack_refs": ["T1078", "T1098", "T1199"]
|
|
1985
|
+
},
|
|
1986
|
+
"FCC-Cyber-Incident-Notification-2024": {
|
|
1987
|
+
"framework": "FCC",
|
|
1988
|
+
"control_id": "47-CFR-64.2011",
|
|
1989
|
+
"control_name": "FCC Cyber Incident Notification (4 business days)",
|
|
1990
|
+
"designed_for": "Notification rule requiring US telecom carriers to report PII or CPNI breaches within 4 business days of discovery (effective 2024-03-13).",
|
|
1991
|
+
"misses": [
|
|
1992
|
+
"No requirement to notify on lawful-intercept-system compromise that does not exfiltrate PII directly (e.g. Salt Typhoon access to LI feeds covering counter-intelligence targets)",
|
|
1993
|
+
"No requirement to notify on signaling-protocol intrusion (SS7 / Diameter abuse) absent PII loss",
|
|
1994
|
+
"4-business-day window is too slow for an ongoing nation-state campaign — peer regulators set tighter limits (NIS2 24h, DORA 4h)",
|
|
1995
|
+
"No structured-data feed for cross-carrier IOC sharing"
|
|
1996
|
+
],
|
|
1997
|
+
"real_requirement": "4-business-day window paired with 24-hour preliminary signal-flag for LI-system compromise + structured CISA / NSA / FBI IOC handoff format.",
|
|
1998
|
+
"status": "open",
|
|
1999
|
+
"opened_date": "2026-05-15",
|
|
2000
|
+
"evidence_cves": [],
|
|
2001
|
+
"atlas_refs": [],
|
|
2002
|
+
"attack_refs": ["T1199", "T1078"]
|
|
2003
|
+
},
|
|
2004
|
+
"NIS2-Annex-I-Telecom": {
|
|
2005
|
+
"framework": "NIS2",
|
|
2006
|
+
"control_id": "Annex-I-Telecommunications",
|
|
2007
|
+
"control_name": "NIS2 Annex I — telecommunications essential entities",
|
|
2008
|
+
"designed_for": "NIS2 Directive (EU) 2022/2555 Annex I classifies telecom providers as essential entities, mandating risk management measures + 24h incident notification + supply-chain due diligence.",
|
|
2009
|
+
"misses": [
|
|
2010
|
+
"No specific obligations on lawful-intercept-system access controls (national-security scope deferred to MS-level law)",
|
|
2011
|
+
"Supply-chain due diligence (Art. 21(2)(d)) does not name OEM-vendor-equipment firmware integrity attestation specifically",
|
|
2012
|
+
"AI-RAN security obligations absent — O-RAN deployments span the entity boundary in ways the NIS2 risk-management framework does not yet model",
|
|
2013
|
+
"24h notification clock starts at significant-incident-detection but signaling-protocol intrusion + slow-roll campaigns evade the trigger"
|
|
2014
|
+
],
|
|
2015
|
+
"real_requirement": "Annex I + explicit LI-gateway operator-attested firmware hash + AI-RAN model-tampering controls + cross-PLMN signaling baseline obligation.",
|
|
2016
|
+
"status": "open",
|
|
2017
|
+
"opened_date": "2026-05-15",
|
|
2018
|
+
"evidence_cves": [],
|
|
2019
|
+
"atlas_refs": ["AML.T0040"],
|
|
2020
|
+
"attack_refs": ["T1199", "T1078", "T1098"]
|
|
2021
|
+
},
|
|
2022
|
+
"DORA-Art-21-Telecom-ICT": {
|
|
2023
|
+
"framework": "DORA",
|
|
2024
|
+
"control_id": "Art-21-Telecom-ICT",
|
|
2025
|
+
"control_name": "DORA Art. 21 — ICT third-party risk (telecom-adjacent application)",
|
|
2026
|
+
"designed_for": "DORA Reg. (EU) 2022/2554 Art. 21 ICT third-party risk management; applies to financial entities consuming telecom-provided ICT services.",
|
|
2027
|
+
"misses": [
|
|
2028
|
+
"Telecom-to-financial trust boundary is asymmetric — DORA binds the financial entity but telecom providers (essential entities under NIS2) may not align reporting cadences",
|
|
2029
|
+
"Lawful-intercept access by the telecom upstream is not in DORA scope but creates a parallel data-exposure surface",
|
|
2030
|
+
"CTPP (critical third-party provider) oversight does not yet cover OEM equipment vendors transitively",
|
|
2031
|
+
"No bridge to 5G slice-isolation obligations for financial-sector dedicated network slices"
|
|
2032
|
+
],
|
|
2033
|
+
"real_requirement": "DORA Art. 21 + alignment with NIS2 telecom-essential-entity reporting + slice-isolation attestation for finance-dedicated 5G slices.",
|
|
2034
|
+
"status": "open",
|
|
2035
|
+
"opened_date": "2026-05-15",
|
|
2036
|
+
"evidence_cves": [],
|
|
2037
|
+
"atlas_refs": [],
|
|
2038
|
+
"attack_refs": ["T1199"]
|
|
2039
|
+
},
|
|
2040
|
+
"UK-CAF-B5": {
|
|
2041
|
+
"framework": "UK-CAF",
|
|
2042
|
+
"control_id": "Principle-B5",
|
|
2043
|
+
"control_name": "Resilient networks and systems",
|
|
2044
|
+
"designed_for": "NCSC Cyber Assessment Framework Principle B5 — outcome-tested network resilience for essential service operators (incl. telecom under TSA 2021).",
|
|
2045
|
+
"misses": [
|
|
2046
|
+
"Signaling-protocol attack-surface (SS7 / Diameter / GTP) not in CAF B5 outcome tests",
|
|
2047
|
+
"gNB / DU / CU integrity attestation not modeled — CAF B5 expects network-availability resilience, not equipment-supply-chain attestation",
|
|
2048
|
+
"Lawful-intercept access path covered by separate IPA 2016 + TSA 2021 + Code of Practice — not CAF scope",
|
|
2049
|
+
"AI-RAN slice-isolation testing not in the CAF outcome catalog"
|
|
2050
|
+
],
|
|
2051
|
+
"real_requirement": "CAF B5 + signaling-anomaly detection + gNB firmware attestation outcome test + slice-isolation outcome test.",
|
|
2052
|
+
"status": "open",
|
|
2053
|
+
"opened_date": "2026-05-15",
|
|
2054
|
+
"evidence_cves": [],
|
|
2055
|
+
"atlas_refs": [],
|
|
2056
|
+
"attack_refs": ["T1199", "T1078"]
|
|
2057
|
+
},
|
|
2058
|
+
"AU-ISM-1556": {
|
|
2059
|
+
"framework": "au-ism",
|
|
2060
|
+
"control_id": "ISM-1556",
|
|
2061
|
+
"control_name": "Multi-factor authentication for privileged users (telecom NMS application)",
|
|
2062
|
+
"designed_for": "Australian Government ISM control ISM-1556 — phishing-resistant MFA for privileged users + remote access.",
|
|
2063
|
+
"misses": [
|
|
2064
|
+
"Telecom NMS service accounts (which hold gNB / EMS / OSS access) often bypass human MFA",
|
|
2065
|
+
"Service-account credential management policy is ISM-1559 (covered separately); ISM-1556 alone is insufficient for telecom OEM-vendor support tunnels",
|
|
2066
|
+
"Lawful-intercept gateway operator credentials specifically uncovered — these are not always classified as privileged in telecom RBAC models",
|
|
2067
|
+
"OEM remote-support inbound tunnels (Cisco TAC, Ericsson ENS) often pass credentials via shared mailbox — defeats MFA intent"
|
|
2068
|
+
],
|
|
2069
|
+
"real_requirement": "ISM-1556 + telecom-NMS service-account FIDO2 enforcement + LI-gateway-specific MFA + OEM remote-support-tunnel federated-MFA mandate.",
|
|
2070
|
+
"status": "open",
|
|
2071
|
+
"opened_date": "2026-05-15",
|
|
2072
|
+
"evidence_cves": [],
|
|
2073
|
+
"atlas_refs": [],
|
|
2074
|
+
"attack_refs": ["T1078", "T1098"]
|
|
2075
|
+
},
|
|
2076
|
+
"GSMA-NESAS-Deployment": {
|
|
2077
|
+
"framework": "GSMA-NESAS",
|
|
2078
|
+
"control_id": "NESAS-Deployment-Gap",
|
|
2079
|
+
"control_name": "NESAS at-deployment posture",
|
|
2080
|
+
"designed_for": "GSMA Network Equipment Security Assurance Scheme — product-time certification of telecom OEM equipment against 3GPP SCAS test cases (GSMA FS.13 / FS.14 / FS.15).",
|
|
2081
|
+
"misses": [
|
|
2082
|
+
"Certification is product-time (one snapshot, vendor-attested); deployment posture drifts as firmware / config evolves",
|
|
2083
|
+
"No post-deployment attested-runtime check — operator has no canonical way to confirm a running gNB matches the certified build",
|
|
2084
|
+
"Firmware update cadence is not tied to NESAS re-certification — vendor patches between certifications run uncertified",
|
|
2085
|
+
"NESAS scope excludes the EMS / OSS / NMS systems that operate the equipment, which is where Salt Typhoon-class campaigns gained access"
|
|
2086
|
+
],
|
|
2087
|
+
"real_requirement": "NESAS product-time certification PLUS operator-attested-runtime gNB hash + EMS / OSS NESAS-equivalent scheme + firmware-update-cadence-tied recertification.",
|
|
2088
|
+
"status": "open",
|
|
2089
|
+
"opened_date": "2026-05-15",
|
|
2090
|
+
"evidence_cves": [],
|
|
2091
|
+
"atlas_refs": [],
|
|
2092
|
+
"attack_refs": ["T1199"]
|
|
2093
|
+
},
|
|
2094
|
+
"3GPP-TR-33.926": {
|
|
2095
|
+
"framework": "3GPP",
|
|
2096
|
+
"control_id": "TR-33.926",
|
|
2097
|
+
"control_name": "3GPP Security Assurance Specification (gNB / eNB)",
|
|
2098
|
+
"designed_for": "3GPP TR 33.926 Security Assurance Specification — security test cases applied against the gNB / eNB product class, paired with the broader 5G security architecture in TS 33.501.",
|
|
2099
|
+
"misses": [
|
|
2100
|
+
"TR 33.926 covers the equipment itself; the AI-RAN / O-RAN deployment is outside scope (O-RAN SFG / WG11 handles separately)",
|
|
2101
|
+
"Test cases assume deterministic equipment behavior — adversary-modified firmware that passes TR 33.926 tests at submission time is undetected after the fact",
|
|
2102
|
+
"N6 / N9 interface isolation testing is in TS 33.501 not TR 33.926 — operators consume both, gap is at the join",
|
|
2103
|
+
"No bridge to ISM-1556-class operator-account hardening for the NMS that operates the certified equipment"
|
|
2104
|
+
],
|
|
2105
|
+
"real_requirement": "TR 33.926 + post-deployment hash-attestation + O-RAN security WG11 alignment + cross-spec join testing between TR 33.926 and TS 33.501.",
|
|
2106
|
+
"status": "open",
|
|
2107
|
+
"opened_date": "2026-05-15",
|
|
2108
|
+
"evidence_cves": [],
|
|
2109
|
+
"atlas_refs": [],
|
|
2110
|
+
"attack_refs": ["T1199"]
|
|
2111
|
+
},
|
|
2112
|
+
"ITU-T-X.805": {
|
|
2113
|
+
"framework": "ITU-T",
|
|
2114
|
+
"control_id": "X.805",
|
|
2115
|
+
"control_name": "ITU-T X.805 — 8-dimension security architecture for end-to-end communications",
|
|
2116
|
+
"designed_for": "ITU-T Recommendation X.805 (2003) — generic 8-dimension security architecture (access control, authentication, non-repudiation, data confidentiality, communication security, data integrity, availability, privacy) for telecom networks.",
|
|
2117
|
+
"misses": [
|
|
2118
|
+
"Specification predates 5G, O-RAN, AI-RAN, and CALEA / IPA-LI surface evolution; control language remains generic",
|
|
2119
|
+
"No mapping to modern threat models (Salt Typhoon, signaling-protocol abuse)",
|
|
2120
|
+
"Treated as reference architecture, not as a deployment-validation framework — operators rarely audit posture against X.805 dimensions directly",
|
|
2121
|
+
"No bridge to NESAS / 3GPP / NIS2 / FCC CPNI specific obligations"
|
|
2122
|
+
],
|
|
2123
|
+
"real_requirement": "X.805 8-dimension framing PLUS modern-threat-model annexes (LI-system compromise, signaling-protocol abuse, slice-isolation) + deployment-validation checklist.",
|
|
2124
|
+
"status": "open",
|
|
2125
|
+
"opened_date": "2026-05-15",
|
|
2126
|
+
"evidence_cves": [],
|
|
2127
|
+
"atlas_refs": [],
|
|
2128
|
+
"attack_refs": ["T1199"]
|
|
1967
2129
|
}
|
|
1968
2130
|
}
|
package/data/rfc-references.json
CHANGED
|
@@ -463,7 +463,8 @@
|
|
|
463
463
|
"relevance": "Transport Services (TAPS) architecture — abstracts the choice of underlying transport (TCP, QUIC, SCTP) behind a unified API that selects the protocol at runtime based on path conditions. Forward-watch relevance: webapp / AI-API client libraries that adopt TAPS may transparently shift between TCP-HTTP/2 and QUIC-HTTP/3 mid-session, complicating boundary inspection assumptions that pin to a single transport. Currently tracked as a deployment-watch item rather than an operational control point.",
|
|
464
464
|
"lag_notes": "Architecture document; companion documents (TAPS implementation, TAPS programming interface) are still in progress at IETF TAPS WG. Enterprise tooling impact is forward-looking.",
|
|
465
465
|
"skills_referencing": [
|
|
466
|
-
"webapp-security"
|
|
466
|
+
"webapp-security",
|
|
467
|
+
"sector-telecom"
|
|
467
468
|
],
|
|
468
469
|
"last_verified": "2026-05-15"
|
|
469
470
|
},
|
package/manifest-snapshot.json
CHANGED
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
{
|
|
2
2
|
"_comment": "Auto-generated by scripts/refresh-manifest-snapshot.js — do not hand-edit. Public skill surface used by check-manifest-snapshot.js to detect breaking removals.",
|
|
3
|
-
"_generated_at": "2026-05-
|
|
3
|
+
"_generated_at": "2026-05-15T22:10:24.906Z",
|
|
4
4
|
"atlas_version": "5.1.0",
|
|
5
|
-
"skill_count":
|
|
5
|
+
"skill_count": 39,
|
|
6
6
|
"skills": [
|
|
7
7
|
{
|
|
8
8
|
"name": "age-gates-child-safety",
|
|
@@ -1543,6 +1543,72 @@
|
|
|
1543
1543
|
"d3fend_refs": [],
|
|
1544
1544
|
"dlp_refs": []
|
|
1545
1545
|
},
|
|
1546
|
+
{
|
|
1547
|
+
"name": "sector-telecom",
|
|
1548
|
+
"version": "1.0.0",
|
|
1549
|
+
"triggers": [
|
|
1550
|
+
"3gpp tr 33.926",
|
|
1551
|
+
"3gpp ts 33.501",
|
|
1552
|
+
"4-business-day notification",
|
|
1553
|
+
"5g core",
|
|
1554
|
+
"au soci",
|
|
1555
|
+
"calea",
|
|
1556
|
+
"diameter",
|
|
1557
|
+
"fcc cpni",
|
|
1558
|
+
"gnb integrity",
|
|
1559
|
+
"gsma nesas",
|
|
1560
|
+
"gtp",
|
|
1561
|
+
"itu-t x.805",
|
|
1562
|
+
"lawful intercept",
|
|
1563
|
+
"n6 n9 isolation",
|
|
1564
|
+
"nis2 annex i",
|
|
1565
|
+
"o-ran",
|
|
1566
|
+
"salt typhoon",
|
|
1567
|
+
"ss7",
|
|
1568
|
+
"telecom security",
|
|
1569
|
+
"tssr",
|
|
1570
|
+
"uk tsa 2021",
|
|
1571
|
+
"volt typhoon"
|
|
1572
|
+
],
|
|
1573
|
+
"data_deps": [],
|
|
1574
|
+
"atlas_refs": [
|
|
1575
|
+
"AML.T0040"
|
|
1576
|
+
],
|
|
1577
|
+
"attack_refs": [
|
|
1578
|
+
"T1071",
|
|
1579
|
+
"T1078",
|
|
1580
|
+
"T1098",
|
|
1581
|
+
"T1190",
|
|
1582
|
+
"T1199",
|
|
1583
|
+
"T1556"
|
|
1584
|
+
],
|
|
1585
|
+
"framework_gaps": [
|
|
1586
|
+
"3GPP-TR-33.926",
|
|
1587
|
+
"AU-ISM-1556",
|
|
1588
|
+
"DORA-Art-21-Telecom-ICT",
|
|
1589
|
+
"FCC-CPNI-4.1",
|
|
1590
|
+
"FCC-Cyber-Incident-Notification-2024",
|
|
1591
|
+
"GSMA-NESAS-Deployment",
|
|
1592
|
+
"ITU-T-X.805",
|
|
1593
|
+
"NIS2-Annex-I-Telecom",
|
|
1594
|
+
"UK-CAF-B5"
|
|
1595
|
+
],
|
|
1596
|
+
"rfc_refs": [
|
|
1597
|
+
"RFC-9622"
|
|
1598
|
+
],
|
|
1599
|
+
"cwe_refs": [
|
|
1600
|
+
"CWE-287",
|
|
1601
|
+
"CWE-306",
|
|
1602
|
+
"CWE-918"
|
|
1603
|
+
],
|
|
1604
|
+
"d3fend_refs": [
|
|
1605
|
+
"D3-IOPR",
|
|
1606
|
+
"D3-NI",
|
|
1607
|
+
"D3-NTA",
|
|
1608
|
+
"D3-NTPM"
|
|
1609
|
+
],
|
|
1610
|
+
"dlp_refs": []
|
|
1611
|
+
},
|
|
1546
1612
|
{
|
|
1547
1613
|
"name": "security-maturity-tiers",
|
|
1548
1614
|
"version": "1.0.0",
|
package/manifest-snapshot.sha256
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
3b2e3c3a40554d760ee71eded57828b0dcd3237ed0c4499ee123606d041bf1dc manifest-snapshot.json
|