@blamejs/exceptd-skills 0.12.27 → 0.12.28
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +3 -0
- package/CHANGELOG.md +22 -0
- package/data/_indexes/_meta.json +22 -19
- package/data/_indexes/activity-feed.json +26 -5
- package/data/_indexes/catalog-summaries.json +3 -3
- package/data/_indexes/chains.json +994 -64
- package/data/_indexes/currency.json +28 -1
- package/data/_indexes/frequency.json +428 -124
- package/data/_indexes/handoff-dag.json +70 -19
- package/data/_indexes/jurisdiction-map.json +37 -12
- package/data/_indexes/section-offsets.json +282 -0
- package/data/_indexes/stale-content.json +2 -2
- package/data/_indexes/summary-cards.json +198 -0
- package/data/_indexes/token-budget.json +168 -3
- package/data/_indexes/trigger-table.json +190 -0
- package/data/_indexes/xref.json +145 -2
- package/data/attack-techniques.json +104 -19
- package/data/framework-control-gaps.json +498 -11
- package/data/playbooks/cloud-iam-incident.json +1351 -0
- package/data/playbooks/idp-incident.json +1259 -0
- package/data/playbooks/ransomware.json +1407 -0
- package/data/rfc-references.json +44 -0
- package/manifest-snapshot.json +219 -2
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +282 -41
- package/package.json +1 -1
- package/sbom.cdx.json +7 -7
- package/skills/cloud-iam-incident/skill.md +419 -0
- package/skills/idp-incident-response/skill.md +352 -0
- package/skills/ransomware-response/skill.md +374 -0
|
@@ -3,9 +3,9 @@
|
|
|
3
3
|
"schema_version": "1.0.0",
|
|
4
4
|
"tokenizer_note": "Character-density approximation: 1 token ≈ 4 chars. This is the canonical rule-of-thumb for OpenAI tokenizers on English+technical text. Claude's tokenizer is typically more efficient on prose; treat this as an upper-bound budget for both. Consumers with stricter precision needs should re-tokenize with their own tokenizer.",
|
|
5
5
|
"approx_chars_per_token": 4,
|
|
6
|
-
"total_chars":
|
|
7
|
-
"total_approx_tokens":
|
|
8
|
-
"skill_count":
|
|
6
|
+
"total_chars": 1589324,
|
|
7
|
+
"total_approx_tokens": 397336,
|
|
8
|
+
"skill_count": 42
|
|
9
9
|
},
|
|
10
10
|
"skills": {
|
|
11
11
|
"kernel-lpe-triage": {
|
|
@@ -2173,6 +2173,61 @@
|
|
|
2173
2173
|
}
|
|
2174
2174
|
}
|
|
2175
2175
|
},
|
|
2176
|
+
"ransomware-response": {
|
|
2177
|
+
"path": "skills/ransomware-response/skill.md",
|
|
2178
|
+
"bytes": 48211,
|
|
2179
|
+
"chars": 48033,
|
|
2180
|
+
"lines": 375,
|
|
2181
|
+
"approx_tokens": 12008,
|
|
2182
|
+
"approx_chars_per_token": 4,
|
|
2183
|
+
"sections": {
|
|
2184
|
+
"threat-context": {
|
|
2185
|
+
"bytes": 5359,
|
|
2186
|
+
"chars": 5353,
|
|
2187
|
+
"approx_tokens": 1338
|
|
2188
|
+
},
|
|
2189
|
+
"framework-lag-declaration": {
|
|
2190
|
+
"bytes": 6795,
|
|
2191
|
+
"chars": 6769,
|
|
2192
|
+
"approx_tokens": 1692
|
|
2193
|
+
},
|
|
2194
|
+
"ttp-mapping": {
|
|
2195
|
+
"bytes": 2219,
|
|
2196
|
+
"chars": 2219,
|
|
2197
|
+
"approx_tokens": 555
|
|
2198
|
+
},
|
|
2199
|
+
"exploit-availability-matrix": {
|
|
2200
|
+
"bytes": 2592,
|
|
2201
|
+
"chars": 2584,
|
|
2202
|
+
"approx_tokens": 646
|
|
2203
|
+
},
|
|
2204
|
+
"analysis-procedure": {
|
|
2205
|
+
"bytes": 11508,
|
|
2206
|
+
"chars": 11460,
|
|
2207
|
+
"approx_tokens": 2865
|
|
2208
|
+
},
|
|
2209
|
+
"output-format": {
|
|
2210
|
+
"bytes": 3811,
|
|
2211
|
+
"chars": 3799,
|
|
2212
|
+
"approx_tokens": 950
|
|
2213
|
+
},
|
|
2214
|
+
"compliance-theater-check": {
|
|
2215
|
+
"bytes": 3787,
|
|
2216
|
+
"chars": 3769,
|
|
2217
|
+
"approx_tokens": 942
|
|
2218
|
+
},
|
|
2219
|
+
"defensive-countermeasure-mapping": {
|
|
2220
|
+
"bytes": 3786,
|
|
2221
|
+
"chars": 3778,
|
|
2222
|
+
"approx_tokens": 945
|
|
2223
|
+
},
|
|
2224
|
+
"hand-off": {
|
|
2225
|
+
"bytes": 3486,
|
|
2226
|
+
"chars": 3460,
|
|
2227
|
+
"approx_tokens": 865
|
|
2228
|
+
}
|
|
2229
|
+
}
|
|
2230
|
+
},
|
|
2176
2231
|
"email-security-anti-phishing": {
|
|
2177
2232
|
"path": "skills/email-security-anti-phishing/skill.md",
|
|
2178
2233
|
"bytes": 26531,
|
|
@@ -2282,6 +2337,116 @@
|
|
|
2282
2337
|
"approx_tokens": 1076
|
|
2283
2338
|
}
|
|
2284
2339
|
}
|
|
2340
|
+
},
|
|
2341
|
+
"cloud-iam-incident": {
|
|
2342
|
+
"path": "skills/cloud-iam-incident/skill.md",
|
|
2343
|
+
"bytes": 44433,
|
|
2344
|
+
"chars": 44275,
|
|
2345
|
+
"lines": 420,
|
|
2346
|
+
"approx_tokens": 11069,
|
|
2347
|
+
"approx_chars_per_token": 4,
|
|
2348
|
+
"sections": {
|
|
2349
|
+
"threat-context": {
|
|
2350
|
+
"bytes": 5786,
|
|
2351
|
+
"chars": 5772,
|
|
2352
|
+
"approx_tokens": 1443
|
|
2353
|
+
},
|
|
2354
|
+
"framework-lag-declaration": {
|
|
2355
|
+
"bytes": 6316,
|
|
2356
|
+
"chars": 6282,
|
|
2357
|
+
"approx_tokens": 1571
|
|
2358
|
+
},
|
|
2359
|
+
"ttp-mapping": {
|
|
2360
|
+
"bytes": 4540,
|
|
2361
|
+
"chars": 4516,
|
|
2362
|
+
"approx_tokens": 1129
|
|
2363
|
+
},
|
|
2364
|
+
"exploit-availability-matrix": {
|
|
2365
|
+
"bytes": 3379,
|
|
2366
|
+
"chars": 3375,
|
|
2367
|
+
"approx_tokens": 844
|
|
2368
|
+
},
|
|
2369
|
+
"analysis-procedure": {
|
|
2370
|
+
"bytes": 7625,
|
|
2371
|
+
"chars": 7601,
|
|
2372
|
+
"approx_tokens": 1900
|
|
2373
|
+
},
|
|
2374
|
+
"output-format": {
|
|
2375
|
+
"bytes": 2198,
|
|
2376
|
+
"chars": 2194,
|
|
2377
|
+
"approx_tokens": 549
|
|
2378
|
+
},
|
|
2379
|
+
"compliance-theater-check": {
|
|
2380
|
+
"bytes": 4599,
|
|
2381
|
+
"chars": 4583,
|
|
2382
|
+
"approx_tokens": 1146
|
|
2383
|
+
},
|
|
2384
|
+
"defensive-countermeasure-mapping": {
|
|
2385
|
+
"bytes": 4076,
|
|
2386
|
+
"chars": 4068,
|
|
2387
|
+
"approx_tokens": 1017
|
|
2388
|
+
},
|
|
2389
|
+
"hand-off": {
|
|
2390
|
+
"bytes": 3037,
|
|
2391
|
+
"chars": 3009,
|
|
2392
|
+
"approx_tokens": 752
|
|
2393
|
+
}
|
|
2394
|
+
}
|
|
2395
|
+
},
|
|
2396
|
+
"idp-incident-response": {
|
|
2397
|
+
"path": "skills/idp-incident-response/skill.md",
|
|
2398
|
+
"bytes": 46225,
|
|
2399
|
+
"chars": 46095,
|
|
2400
|
+
"lines": 353,
|
|
2401
|
+
"approx_tokens": 11524,
|
|
2402
|
+
"approx_chars_per_token": 4,
|
|
2403
|
+
"sections": {
|
|
2404
|
+
"threat-context": {
|
|
2405
|
+
"bytes": 5837,
|
|
2406
|
+
"chars": 5817,
|
|
2407
|
+
"approx_tokens": 1454
|
|
2408
|
+
},
|
|
2409
|
+
"framework-lag-declaration": {
|
|
2410
|
+
"bytes": 6634,
|
|
2411
|
+
"chars": 6632,
|
|
2412
|
+
"approx_tokens": 1658
|
|
2413
|
+
},
|
|
2414
|
+
"ttp-mapping": {
|
|
2415
|
+
"bytes": 4081,
|
|
2416
|
+
"chars": 4069,
|
|
2417
|
+
"approx_tokens": 1017
|
|
2418
|
+
},
|
|
2419
|
+
"exploit-availability-matrix": {
|
|
2420
|
+
"bytes": 3715,
|
|
2421
|
+
"chars": 3697,
|
|
2422
|
+
"approx_tokens": 924
|
|
2423
|
+
},
|
|
2424
|
+
"analysis-procedure": {
|
|
2425
|
+
"bytes": 7086,
|
|
2426
|
+
"chars": 7064,
|
|
2427
|
+
"approx_tokens": 1766
|
|
2428
|
+
},
|
|
2429
|
+
"output-format": {
|
|
2430
|
+
"bytes": 3183,
|
|
2431
|
+
"chars": 3179,
|
|
2432
|
+
"approx_tokens": 795
|
|
2433
|
+
},
|
|
2434
|
+
"compliance-theater-check": {
|
|
2435
|
+
"bytes": 4461,
|
|
2436
|
+
"chars": 4447,
|
|
2437
|
+
"approx_tokens": 1112
|
|
2438
|
+
},
|
|
2439
|
+
"defensive-countermeasure-mapping": {
|
|
2440
|
+
"bytes": 4522,
|
|
2441
|
+
"chars": 4518,
|
|
2442
|
+
"approx_tokens": 1130
|
|
2443
|
+
},
|
|
2444
|
+
"hand-off": {
|
|
2445
|
+
"bytes": 3841,
|
|
2446
|
+
"chars": 3817,
|
|
2447
|
+
"approx_tokens": 954
|
|
2448
|
+
}
|
|
2449
|
+
}
|
|
2285
2450
|
}
|
|
2286
2451
|
}
|
|
2287
2452
|
}
|
|
@@ -1329,6 +1329,72 @@
|
|
|
1329
1329
|
"model exfiltration incident": [
|
|
1330
1330
|
"incident-response-playbook"
|
|
1331
1331
|
],
|
|
1332
|
+
"ransomware": [
|
|
1333
|
+
"ransomware-response"
|
|
1334
|
+
],
|
|
1335
|
+
"ransomware incident": [
|
|
1336
|
+
"ransomware-response"
|
|
1337
|
+
],
|
|
1338
|
+
"encryption event": [
|
|
1339
|
+
"ransomware-response"
|
|
1340
|
+
],
|
|
1341
|
+
"akira ransomware": [
|
|
1342
|
+
"ransomware-response"
|
|
1343
|
+
],
|
|
1344
|
+
"lockbit": [
|
|
1345
|
+
"ransomware-response"
|
|
1346
|
+
],
|
|
1347
|
+
"alphv": [
|
|
1348
|
+
"ransomware-response"
|
|
1349
|
+
],
|
|
1350
|
+
"blackcat": [
|
|
1351
|
+
"ransomware-response"
|
|
1352
|
+
],
|
|
1353
|
+
"cuba ransomware": [
|
|
1354
|
+
"ransomware-response"
|
|
1355
|
+
],
|
|
1356
|
+
"royal ransomware": [
|
|
1357
|
+
"ransomware-response"
|
|
1358
|
+
],
|
|
1359
|
+
"blacksuit": [
|
|
1360
|
+
"ransomware-response"
|
|
1361
|
+
],
|
|
1362
|
+
"hunters international": [
|
|
1363
|
+
"ransomware-response"
|
|
1364
|
+
],
|
|
1365
|
+
"ransomhub": [
|
|
1366
|
+
"ransomware-response"
|
|
1367
|
+
],
|
|
1368
|
+
"ofac sanctions ransomware": [
|
|
1369
|
+
"ransomware-response"
|
|
1370
|
+
],
|
|
1371
|
+
"ransom payment": [
|
|
1372
|
+
"ransomware-response"
|
|
1373
|
+
],
|
|
1374
|
+
"decryptor availability": [
|
|
1375
|
+
"ransomware-response"
|
|
1376
|
+
],
|
|
1377
|
+
"no more ransom": [
|
|
1378
|
+
"ransomware-response"
|
|
1379
|
+
],
|
|
1380
|
+
"cyber insurance ransomware": [
|
|
1381
|
+
"ransomware-response"
|
|
1382
|
+
],
|
|
1383
|
+
"immutable backup": [
|
|
1384
|
+
"ransomware-response"
|
|
1385
|
+
],
|
|
1386
|
+
"shadow copy deletion": [
|
|
1387
|
+
"ransomware-response"
|
|
1388
|
+
],
|
|
1389
|
+
"exfil before encrypt": [
|
|
1390
|
+
"ransomware-response"
|
|
1391
|
+
],
|
|
1392
|
+
"double extortion": [
|
|
1393
|
+
"ransomware-response"
|
|
1394
|
+
],
|
|
1395
|
+
"data theft before encryption": [
|
|
1396
|
+
"ransomware-response"
|
|
1397
|
+
],
|
|
1332
1398
|
"email security": [
|
|
1333
1399
|
"email-security-anti-phishing"
|
|
1334
1400
|
],
|
|
@@ -1436,5 +1502,129 @@
|
|
|
1436
1502
|
],
|
|
1437
1503
|
"children's online safety": [
|
|
1438
1504
|
"age-gates-child-safety"
|
|
1505
|
+
],
|
|
1506
|
+
"cloud iam compromise": [
|
|
1507
|
+
"cloud-iam-incident"
|
|
1508
|
+
],
|
|
1509
|
+
"aws account takeover": [
|
|
1510
|
+
"cloud-iam-incident"
|
|
1511
|
+
],
|
|
1512
|
+
"gcp service account compromise": [
|
|
1513
|
+
"cloud-iam-incident"
|
|
1514
|
+
],
|
|
1515
|
+
"azure managed identity replay": [
|
|
1516
|
+
"cloud-iam-incident"
|
|
1517
|
+
],
|
|
1518
|
+
"cross account assume role": [
|
|
1519
|
+
"cloud-iam-incident"
|
|
1520
|
+
],
|
|
1521
|
+
"federated trust abuse": [
|
|
1522
|
+
"cloud-iam-incident",
|
|
1523
|
+
"idp-incident-response"
|
|
1524
|
+
],
|
|
1525
|
+
"oidc trust policy": [
|
|
1526
|
+
"cloud-iam-incident"
|
|
1527
|
+
],
|
|
1528
|
+
"workload identity federation": [
|
|
1529
|
+
"cloud-iam-incident"
|
|
1530
|
+
],
|
|
1531
|
+
"iam access key leak": [
|
|
1532
|
+
"cloud-iam-incident"
|
|
1533
|
+
],
|
|
1534
|
+
"cloudtrail anomaly": [
|
|
1535
|
+
"cloud-iam-incident"
|
|
1536
|
+
],
|
|
1537
|
+
"imds metadata abuse": [
|
|
1538
|
+
"cloud-iam-incident"
|
|
1539
|
+
],
|
|
1540
|
+
"imdsv1 ssrf": [
|
|
1541
|
+
"cloud-iam-incident"
|
|
1542
|
+
],
|
|
1543
|
+
"scattered spider aws": [
|
|
1544
|
+
"cloud-iam-incident"
|
|
1545
|
+
],
|
|
1546
|
+
"snowflake aa24": [
|
|
1547
|
+
"cloud-iam-incident"
|
|
1548
|
+
],
|
|
1549
|
+
"aws sso compromise": [
|
|
1550
|
+
"cloud-iam-incident"
|
|
1551
|
+
],
|
|
1552
|
+
"iam identity center": [
|
|
1553
|
+
"cloud-iam-incident"
|
|
1554
|
+
],
|
|
1555
|
+
"crypto mining cloud": [
|
|
1556
|
+
"cloud-iam-incident"
|
|
1557
|
+
],
|
|
1558
|
+
"access key public repo": [
|
|
1559
|
+
"cloud-iam-incident"
|
|
1560
|
+
],
|
|
1561
|
+
"idp incident": [
|
|
1562
|
+
"idp-incident-response"
|
|
1563
|
+
],
|
|
1564
|
+
"identity provider incident": [
|
|
1565
|
+
"idp-incident-response"
|
|
1566
|
+
],
|
|
1567
|
+
"okta breach": [
|
|
1568
|
+
"idp-incident-response"
|
|
1569
|
+
],
|
|
1570
|
+
"okta compromise": [
|
|
1571
|
+
"idp-incident-response"
|
|
1572
|
+
],
|
|
1573
|
+
"entra id compromise": [
|
|
1574
|
+
"idp-incident-response"
|
|
1575
|
+
],
|
|
1576
|
+
"entra app consent": [
|
|
1577
|
+
"idp-incident-response"
|
|
1578
|
+
],
|
|
1579
|
+
"auth0 breach": [
|
|
1580
|
+
"idp-incident-response"
|
|
1581
|
+
],
|
|
1582
|
+
"ping identity breach": [
|
|
1583
|
+
"idp-incident-response"
|
|
1584
|
+
],
|
|
1585
|
+
"onelogin breach": [
|
|
1586
|
+
"idp-incident-response"
|
|
1587
|
+
],
|
|
1588
|
+
"midnight blizzard": [
|
|
1589
|
+
"idp-incident-response"
|
|
1590
|
+
],
|
|
1591
|
+
"cozy bear": [
|
|
1592
|
+
"idp-incident-response"
|
|
1593
|
+
],
|
|
1594
|
+
"apt29 entra": [
|
|
1595
|
+
"idp-incident-response"
|
|
1596
|
+
],
|
|
1597
|
+
"scattered spider": [
|
|
1598
|
+
"idp-incident-response"
|
|
1599
|
+
],
|
|
1600
|
+
"octo tempest": [
|
|
1601
|
+
"idp-incident-response"
|
|
1602
|
+
],
|
|
1603
|
+
"storm-0875": [
|
|
1604
|
+
"idp-incident-response"
|
|
1605
|
+
],
|
|
1606
|
+
"oauth consent abuse": [
|
|
1607
|
+
"idp-incident-response"
|
|
1608
|
+
],
|
|
1609
|
+
"saml token forgery": [
|
|
1610
|
+
"idp-incident-response"
|
|
1611
|
+
],
|
|
1612
|
+
"cross-tenant abuse": [
|
|
1613
|
+
"idp-incident-response"
|
|
1614
|
+
],
|
|
1615
|
+
"management api token leak": [
|
|
1616
|
+
"idp-incident-response"
|
|
1617
|
+
],
|
|
1618
|
+
"service account compromise": [
|
|
1619
|
+
"idp-incident-response"
|
|
1620
|
+
],
|
|
1621
|
+
"help-desk social engineering": [
|
|
1622
|
+
"idp-incident-response"
|
|
1623
|
+
],
|
|
1624
|
+
"mfa factor swap": [
|
|
1625
|
+
"idp-incident-response"
|
|
1626
|
+
],
|
|
1627
|
+
"tenant compromise": [
|
|
1628
|
+
"idp-incident-response"
|
|
1439
1629
|
]
|
|
1440
1630
|
}
|