@blamejs/exceptd-skills 0.12.27 → 0.12.28

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3,9 +3,9 @@
3
3
  "schema_version": "1.0.0",
4
4
  "tokenizer_note": "Character-density approximation: 1 token ≈ 4 chars. This is the canonical rule-of-thumb for OpenAI tokenizers on English+technical text. Claude's tokenizer is typically more efficient on prose; treat this as an upper-bound budget for both. Consumers with stricter precision needs should re-tokenize with their own tokenizer.",
5
5
  "approx_chars_per_token": 4,
6
- "total_chars": 1450921,
7
- "total_approx_tokens": 362735,
8
- "skill_count": 39
6
+ "total_chars": 1589324,
7
+ "total_approx_tokens": 397336,
8
+ "skill_count": 42
9
9
  },
10
10
  "skills": {
11
11
  "kernel-lpe-triage": {
@@ -2173,6 +2173,61 @@
2173
2173
  }
2174
2174
  }
2175
2175
  },
2176
+ "ransomware-response": {
2177
+ "path": "skills/ransomware-response/skill.md",
2178
+ "bytes": 48211,
2179
+ "chars": 48033,
2180
+ "lines": 375,
2181
+ "approx_tokens": 12008,
2182
+ "approx_chars_per_token": 4,
2183
+ "sections": {
2184
+ "threat-context": {
2185
+ "bytes": 5359,
2186
+ "chars": 5353,
2187
+ "approx_tokens": 1338
2188
+ },
2189
+ "framework-lag-declaration": {
2190
+ "bytes": 6795,
2191
+ "chars": 6769,
2192
+ "approx_tokens": 1692
2193
+ },
2194
+ "ttp-mapping": {
2195
+ "bytes": 2219,
2196
+ "chars": 2219,
2197
+ "approx_tokens": 555
2198
+ },
2199
+ "exploit-availability-matrix": {
2200
+ "bytes": 2592,
2201
+ "chars": 2584,
2202
+ "approx_tokens": 646
2203
+ },
2204
+ "analysis-procedure": {
2205
+ "bytes": 11508,
2206
+ "chars": 11460,
2207
+ "approx_tokens": 2865
2208
+ },
2209
+ "output-format": {
2210
+ "bytes": 3811,
2211
+ "chars": 3799,
2212
+ "approx_tokens": 950
2213
+ },
2214
+ "compliance-theater-check": {
2215
+ "bytes": 3787,
2216
+ "chars": 3769,
2217
+ "approx_tokens": 942
2218
+ },
2219
+ "defensive-countermeasure-mapping": {
2220
+ "bytes": 3786,
2221
+ "chars": 3778,
2222
+ "approx_tokens": 945
2223
+ },
2224
+ "hand-off": {
2225
+ "bytes": 3486,
2226
+ "chars": 3460,
2227
+ "approx_tokens": 865
2228
+ }
2229
+ }
2230
+ },
2176
2231
  "email-security-anti-phishing": {
2177
2232
  "path": "skills/email-security-anti-phishing/skill.md",
2178
2233
  "bytes": 26531,
@@ -2282,6 +2337,116 @@
2282
2337
  "approx_tokens": 1076
2283
2338
  }
2284
2339
  }
2340
+ },
2341
+ "cloud-iam-incident": {
2342
+ "path": "skills/cloud-iam-incident/skill.md",
2343
+ "bytes": 44433,
2344
+ "chars": 44275,
2345
+ "lines": 420,
2346
+ "approx_tokens": 11069,
2347
+ "approx_chars_per_token": 4,
2348
+ "sections": {
2349
+ "threat-context": {
2350
+ "bytes": 5786,
2351
+ "chars": 5772,
2352
+ "approx_tokens": 1443
2353
+ },
2354
+ "framework-lag-declaration": {
2355
+ "bytes": 6316,
2356
+ "chars": 6282,
2357
+ "approx_tokens": 1571
2358
+ },
2359
+ "ttp-mapping": {
2360
+ "bytes": 4540,
2361
+ "chars": 4516,
2362
+ "approx_tokens": 1129
2363
+ },
2364
+ "exploit-availability-matrix": {
2365
+ "bytes": 3379,
2366
+ "chars": 3375,
2367
+ "approx_tokens": 844
2368
+ },
2369
+ "analysis-procedure": {
2370
+ "bytes": 7625,
2371
+ "chars": 7601,
2372
+ "approx_tokens": 1900
2373
+ },
2374
+ "output-format": {
2375
+ "bytes": 2198,
2376
+ "chars": 2194,
2377
+ "approx_tokens": 549
2378
+ },
2379
+ "compliance-theater-check": {
2380
+ "bytes": 4599,
2381
+ "chars": 4583,
2382
+ "approx_tokens": 1146
2383
+ },
2384
+ "defensive-countermeasure-mapping": {
2385
+ "bytes": 4076,
2386
+ "chars": 4068,
2387
+ "approx_tokens": 1017
2388
+ },
2389
+ "hand-off": {
2390
+ "bytes": 3037,
2391
+ "chars": 3009,
2392
+ "approx_tokens": 752
2393
+ }
2394
+ }
2395
+ },
2396
+ "idp-incident-response": {
2397
+ "path": "skills/idp-incident-response/skill.md",
2398
+ "bytes": 46225,
2399
+ "chars": 46095,
2400
+ "lines": 353,
2401
+ "approx_tokens": 11524,
2402
+ "approx_chars_per_token": 4,
2403
+ "sections": {
2404
+ "threat-context": {
2405
+ "bytes": 5837,
2406
+ "chars": 5817,
2407
+ "approx_tokens": 1454
2408
+ },
2409
+ "framework-lag-declaration": {
2410
+ "bytes": 6634,
2411
+ "chars": 6632,
2412
+ "approx_tokens": 1658
2413
+ },
2414
+ "ttp-mapping": {
2415
+ "bytes": 4081,
2416
+ "chars": 4069,
2417
+ "approx_tokens": 1017
2418
+ },
2419
+ "exploit-availability-matrix": {
2420
+ "bytes": 3715,
2421
+ "chars": 3697,
2422
+ "approx_tokens": 924
2423
+ },
2424
+ "analysis-procedure": {
2425
+ "bytes": 7086,
2426
+ "chars": 7064,
2427
+ "approx_tokens": 1766
2428
+ },
2429
+ "output-format": {
2430
+ "bytes": 3183,
2431
+ "chars": 3179,
2432
+ "approx_tokens": 795
2433
+ },
2434
+ "compliance-theater-check": {
2435
+ "bytes": 4461,
2436
+ "chars": 4447,
2437
+ "approx_tokens": 1112
2438
+ },
2439
+ "defensive-countermeasure-mapping": {
2440
+ "bytes": 4522,
2441
+ "chars": 4518,
2442
+ "approx_tokens": 1130
2443
+ },
2444
+ "hand-off": {
2445
+ "bytes": 3841,
2446
+ "chars": 3817,
2447
+ "approx_tokens": 954
2448
+ }
2449
+ }
2285
2450
  }
2286
2451
  }
2287
2452
  }
@@ -1329,6 +1329,72 @@
1329
1329
  "model exfiltration incident": [
1330
1330
  "incident-response-playbook"
1331
1331
  ],
1332
+ "ransomware": [
1333
+ "ransomware-response"
1334
+ ],
1335
+ "ransomware incident": [
1336
+ "ransomware-response"
1337
+ ],
1338
+ "encryption event": [
1339
+ "ransomware-response"
1340
+ ],
1341
+ "akira ransomware": [
1342
+ "ransomware-response"
1343
+ ],
1344
+ "lockbit": [
1345
+ "ransomware-response"
1346
+ ],
1347
+ "alphv": [
1348
+ "ransomware-response"
1349
+ ],
1350
+ "blackcat": [
1351
+ "ransomware-response"
1352
+ ],
1353
+ "cuba ransomware": [
1354
+ "ransomware-response"
1355
+ ],
1356
+ "royal ransomware": [
1357
+ "ransomware-response"
1358
+ ],
1359
+ "blacksuit": [
1360
+ "ransomware-response"
1361
+ ],
1362
+ "hunters international": [
1363
+ "ransomware-response"
1364
+ ],
1365
+ "ransomhub": [
1366
+ "ransomware-response"
1367
+ ],
1368
+ "ofac sanctions ransomware": [
1369
+ "ransomware-response"
1370
+ ],
1371
+ "ransom payment": [
1372
+ "ransomware-response"
1373
+ ],
1374
+ "decryptor availability": [
1375
+ "ransomware-response"
1376
+ ],
1377
+ "no more ransom": [
1378
+ "ransomware-response"
1379
+ ],
1380
+ "cyber insurance ransomware": [
1381
+ "ransomware-response"
1382
+ ],
1383
+ "immutable backup": [
1384
+ "ransomware-response"
1385
+ ],
1386
+ "shadow copy deletion": [
1387
+ "ransomware-response"
1388
+ ],
1389
+ "exfil before encrypt": [
1390
+ "ransomware-response"
1391
+ ],
1392
+ "double extortion": [
1393
+ "ransomware-response"
1394
+ ],
1395
+ "data theft before encryption": [
1396
+ "ransomware-response"
1397
+ ],
1332
1398
  "email security": [
1333
1399
  "email-security-anti-phishing"
1334
1400
  ],
@@ -1436,5 +1502,129 @@
1436
1502
  ],
1437
1503
  "children's online safety": [
1438
1504
  "age-gates-child-safety"
1505
+ ],
1506
+ "cloud iam compromise": [
1507
+ "cloud-iam-incident"
1508
+ ],
1509
+ "aws account takeover": [
1510
+ "cloud-iam-incident"
1511
+ ],
1512
+ "gcp service account compromise": [
1513
+ "cloud-iam-incident"
1514
+ ],
1515
+ "azure managed identity replay": [
1516
+ "cloud-iam-incident"
1517
+ ],
1518
+ "cross account assume role": [
1519
+ "cloud-iam-incident"
1520
+ ],
1521
+ "federated trust abuse": [
1522
+ "cloud-iam-incident",
1523
+ "idp-incident-response"
1524
+ ],
1525
+ "oidc trust policy": [
1526
+ "cloud-iam-incident"
1527
+ ],
1528
+ "workload identity federation": [
1529
+ "cloud-iam-incident"
1530
+ ],
1531
+ "iam access key leak": [
1532
+ "cloud-iam-incident"
1533
+ ],
1534
+ "cloudtrail anomaly": [
1535
+ "cloud-iam-incident"
1536
+ ],
1537
+ "imds metadata abuse": [
1538
+ "cloud-iam-incident"
1539
+ ],
1540
+ "imdsv1 ssrf": [
1541
+ "cloud-iam-incident"
1542
+ ],
1543
+ "scattered spider aws": [
1544
+ "cloud-iam-incident"
1545
+ ],
1546
+ "snowflake aa24": [
1547
+ "cloud-iam-incident"
1548
+ ],
1549
+ "aws sso compromise": [
1550
+ "cloud-iam-incident"
1551
+ ],
1552
+ "iam identity center": [
1553
+ "cloud-iam-incident"
1554
+ ],
1555
+ "crypto mining cloud": [
1556
+ "cloud-iam-incident"
1557
+ ],
1558
+ "access key public repo": [
1559
+ "cloud-iam-incident"
1560
+ ],
1561
+ "idp incident": [
1562
+ "idp-incident-response"
1563
+ ],
1564
+ "identity provider incident": [
1565
+ "idp-incident-response"
1566
+ ],
1567
+ "okta breach": [
1568
+ "idp-incident-response"
1569
+ ],
1570
+ "okta compromise": [
1571
+ "idp-incident-response"
1572
+ ],
1573
+ "entra id compromise": [
1574
+ "idp-incident-response"
1575
+ ],
1576
+ "entra app consent": [
1577
+ "idp-incident-response"
1578
+ ],
1579
+ "auth0 breach": [
1580
+ "idp-incident-response"
1581
+ ],
1582
+ "ping identity breach": [
1583
+ "idp-incident-response"
1584
+ ],
1585
+ "onelogin breach": [
1586
+ "idp-incident-response"
1587
+ ],
1588
+ "midnight blizzard": [
1589
+ "idp-incident-response"
1590
+ ],
1591
+ "cozy bear": [
1592
+ "idp-incident-response"
1593
+ ],
1594
+ "apt29 entra": [
1595
+ "idp-incident-response"
1596
+ ],
1597
+ "scattered spider": [
1598
+ "idp-incident-response"
1599
+ ],
1600
+ "octo tempest": [
1601
+ "idp-incident-response"
1602
+ ],
1603
+ "storm-0875": [
1604
+ "idp-incident-response"
1605
+ ],
1606
+ "oauth consent abuse": [
1607
+ "idp-incident-response"
1608
+ ],
1609
+ "saml token forgery": [
1610
+ "idp-incident-response"
1611
+ ],
1612
+ "cross-tenant abuse": [
1613
+ "idp-incident-response"
1614
+ ],
1615
+ "management api token leak": [
1616
+ "idp-incident-response"
1617
+ ],
1618
+ "service account compromise": [
1619
+ "idp-incident-response"
1620
+ ],
1621
+ "help-desk social engineering": [
1622
+ "idp-incident-response"
1623
+ ],
1624
+ "mfa factor swap": [
1625
+ "idp-incident-response"
1626
+ ],
1627
+ "tenant compromise": [
1628
+ "idp-incident-response"
1439
1629
  ]
1440
1630
  }