@blamejs/exceptd-skills 0.12.27 → 0.12.29

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (41) hide show
  1. package/AGENTS.md +4 -1
  2. package/CHANGELOG.md +54 -0
  3. package/bin/exceptd.js +30 -20
  4. package/data/_indexes/_meta.json +26 -23
  5. package/data/_indexes/activity-feed.json +32 -11
  6. package/data/_indexes/catalog-summaries.json +3 -3
  7. package/data/_indexes/chains.json +965 -35
  8. package/data/_indexes/currency.json +68 -41
  9. package/data/_indexes/frequency.json +428 -124
  10. package/data/_indexes/handoff-dag.json +70 -19
  11. package/data/_indexes/jurisdiction-map.json +37 -12
  12. package/data/_indexes/section-offsets.json +282 -0
  13. package/data/_indexes/stale-content.json +3 -3
  14. package/data/_indexes/summary-cards.json +198 -0
  15. package/data/_indexes/token-budget.json +168 -3
  16. package/data/_indexes/trigger-table.json +190 -0
  17. package/data/_indexes/xref.json +145 -2
  18. package/data/atlas-ttps.json +61 -111
  19. package/data/attack-techniques.json +104 -19
  20. package/data/cve-catalog.json +101 -45
  21. package/data/cwe-catalog.json +149 -94
  22. package/data/d3fend-catalog.json +199 -53
  23. package/data/framework-control-gaps.json +1679 -89
  24. package/data/playbooks/cloud-iam-incident.json +1351 -0
  25. package/data/playbooks/crypto-codebase.json +1 -1
  26. package/data/playbooks/idp-incident.json +1259 -0
  27. package/data/playbooks/ransomware.json +1407 -0
  28. package/data/rfc-references.json +58 -59
  29. package/lib/exit-codes.js +2 -0
  30. package/lib/playbook-runner.js +25 -1
  31. package/manifest-snapshot.json +220 -3
  32. package/manifest-snapshot.sha256 +1 -1
  33. package/manifest.json +287 -45
  34. package/package.json +3 -2
  35. package/sbom.cdx.json +1854 -11
  36. package/scripts/backfill-theater-test.js +806 -0
  37. package/scripts/refresh-reverse-refs.js +171 -0
  38. package/scripts/refresh-sbom.js +155 -8
  39. package/skills/cloud-iam-incident/skill.md +419 -0
  40. package/skills/idp-incident-response/skill.md +352 -0
  41. package/skills/ransomware-response/skill.md +374 -0
@@ -49,8 +49,13 @@
49
49
  "Executable Script"
50
50
  ],
51
51
  "skills_referencing": [
52
+ "attack-surface-pentest",
53
+ "defensive-countermeasure-mapping",
54
+ "dlp-gap-analysis",
55
+ "fuzz-testing-strategy",
52
56
  "kernel-lpe-triage",
53
- "mcp-agent-trust"
57
+ "mcp-agent-trust",
58
+ "supply-chain-integrity"
54
59
  ],
55
60
  "implementation_examples": [
56
61
  "AppLocker (Windows)",
@@ -89,8 +94,9 @@
89
94
  "File Hash"
90
95
  ],
91
96
  "skills_referencing": [
97
+ "defensive-countermeasure-mapping",
92
98
  "mcp-agent-trust",
93
- "kernel-lpe-triage"
99
+ "supply-chain-integrity"
94
100
  ],
95
101
  "implementation_examples": [
96
102
  "WDAC hash rules",
@@ -124,6 +130,8 @@
124
130
  "Process Segment"
125
131
  ],
126
132
  "skills_referencing": [
133
+ "defensive-countermeasure-mapping",
134
+ "fuzz-testing-strategy",
127
135
  "kernel-lpe-triage"
128
136
  ],
129
137
  "implementation_examples": [
@@ -156,6 +164,7 @@
156
164
  "Process Segment"
157
165
  ],
158
166
  "skills_referencing": [
167
+ "defensive-countermeasure-mapping",
159
168
  "kernel-lpe-triage"
160
169
  ],
161
170
  "implementation_examples": [
@@ -188,8 +197,7 @@
188
197
  "System Call"
189
198
  ],
190
199
  "skills_referencing": [
191
- "kernel-lpe-triage",
192
- "mcp-agent-trust"
200
+ "defensive-countermeasure-mapping"
193
201
  ],
194
202
  "implementation_examples": [
195
203
  "seccomp-bpf profiles (Docker default, gVisor)",
@@ -223,6 +231,7 @@
223
231
  "Hardware Performance Counter"
224
232
  ],
225
233
  "skills_referencing": [
234
+ "defensive-countermeasure-mapping",
226
235
  "kernel-lpe-triage"
227
236
  ],
228
237
  "implementation_examples": [
@@ -256,8 +265,8 @@
256
265
  "Message"
257
266
  ],
258
267
  "skills_referencing": [
259
- "pqc-first",
260
- "mcp-agent-trust"
268
+ "defensive-countermeasure-mapping",
269
+ "pqc-first"
261
270
  ],
262
271
  "implementation_examples": [
263
272
  "TLS 1.3 with hybrid X25519MLKEM768 key exchange (RFC 9794-class drafts)",
@@ -291,6 +300,7 @@
291
300
  "Encrypted File"
292
301
  ],
293
302
  "skills_referencing": [
303
+ "defensive-countermeasure-mapping",
294
304
  "pqc-first"
295
305
  ],
296
306
  "implementation_examples": [
@@ -326,8 +336,11 @@
326
336
  "Authentication Service"
327
337
  ],
328
338
  "skills_referencing": [
339
+ "cloud-iam-incident",
340
+ "defensive-countermeasure-mapping",
341
+ "idp-incident-response",
329
342
  "mcp-agent-trust",
330
- "pqc-first"
343
+ "supply-chain-integrity"
331
344
  ],
332
345
  "implementation_examples": [
333
346
  "mTLS for service-to-service auth",
@@ -362,6 +375,9 @@
362
375
  "Authentication Service"
363
376
  ],
364
377
  "skills_referencing": [
378
+ "cloud-iam-incident",
379
+ "defensive-countermeasure-mapping",
380
+ "idp-incident-response",
365
381
  "mcp-agent-trust"
366
382
  ],
367
383
  "implementation_examples": [
@@ -398,8 +414,8 @@
398
414
  "Network Traffic"
399
415
  ],
400
416
  "skills_referencing": [
401
- "mcp-agent-trust",
402
- "ai-c2-detection"
417
+ "ai-c2-detection",
418
+ "defensive-countermeasure-mapping"
403
419
  ],
404
420
  "implementation_examples": [
405
421
  "Certificate Transparency log monitoring (Sigsum, CT Watch)",
@@ -435,8 +451,8 @@
435
451
  "Network Traffic"
436
452
  ],
437
453
  "skills_referencing": [
438
- "mcp-agent-trust",
439
- "ai-c2-detection"
454
+ "ai-c2-detection",
455
+ "defensive-countermeasure-mapping"
440
456
  ],
441
457
  "implementation_examples": [
442
458
  "Newly Observed Domain (NOD) blocking",
@@ -471,7 +487,16 @@
471
487
  "Network Flow"
472
488
  ],
473
489
  "skills_referencing": [
474
- "ai-c2-detection"
490
+ "ai-attack-surface",
491
+ "ai-c2-detection",
492
+ "attack-surface-pentest",
493
+ "cloud-iam-incident",
494
+ "defensive-countermeasure-mapping",
495
+ "dlp-gap-analysis",
496
+ "idp-incident-response",
497
+ "rag-pipeline-security",
498
+ "ransomware-response",
499
+ "sector-telecom"
475
500
  ],
476
501
  "implementation_examples": [
477
502
  "Zeek / Suricata flow analysis",
@@ -505,7 +530,10 @@
505
530
  "Network Flow"
506
531
  ],
507
532
  "skills_referencing": [
508
- "ai-c2-detection"
533
+ "ai-c2-detection",
534
+ "defensive-countermeasure-mapping",
535
+ "dlp-gap-analysis",
536
+ "sector-telecom"
509
537
  ],
510
538
  "implementation_examples": [
511
539
  "Service mesh allow-policies (Istio AuthorizationPolicy, Linkerd)",
@@ -541,7 +569,12 @@
541
569
  ],
542
570
  "skills_referencing": [
543
571
  "ai-c2-detection",
544
- "mcp-agent-trust"
572
+ "attack-surface-pentest",
573
+ "defensive-countermeasure-mapping",
574
+ "dlp-gap-analysis",
575
+ "mcp-agent-trust",
576
+ "rag-pipeline-security",
577
+ "ransomware-response"
545
578
  ],
546
579
  "implementation_examples": [
547
580
  "AI-API request body inspection at egress proxy (CloudFlare AI Gateway, LiteLLM proxy)",
@@ -577,7 +610,15 @@
577
610
  ],
578
611
  "skills_referencing": [
579
612
  "ai-attack-surface",
580
- "rag-pipeline-security"
613
+ "ai-c2-detection",
614
+ "cloud-iam-incident",
615
+ "defensive-countermeasure-mapping",
616
+ "dlp-gap-analysis",
617
+ "fuzz-testing-strategy",
618
+ "idp-incident-response",
619
+ "rag-pipeline-security",
620
+ "ransomware-response",
621
+ "sector-telecom"
581
622
  ],
582
623
  "implementation_examples": [
583
624
  "LLM output classifier for safety-bypass content (Llama Guard, Granite Guardian)",
@@ -611,7 +652,8 @@
611
652
  "Process Tree"
612
653
  ],
613
654
  "skills_referencing": [
614
- "ai-c2-detection"
655
+ "defensive-countermeasure-mapping",
656
+ "ransomware-response"
615
657
  ],
616
658
  "implementation_examples": [
617
659
  "EDR with process-network correlation (CrowdStrike, SentinelOne, Defender for Endpoint)",
@@ -645,8 +687,7 @@
645
687
  "File Access"
646
688
  ],
647
689
  "skills_referencing": [
648
- "kernel-lpe-triage",
649
- "mcp-agent-trust"
690
+ "defensive-countermeasure-mapping"
650
691
  ],
651
692
  "implementation_examples": [
652
693
  "auditd FIM with behavioral rules",
@@ -681,7 +722,8 @@
681
722
  ],
682
723
  "skills_referencing": [
683
724
  "ai-c2-detection",
684
- "kernel-lpe-triage"
725
+ "defensive-countermeasure-mapping",
726
+ "sector-telecom"
685
727
  ],
686
728
  "implementation_examples": [
687
729
  "VPC egress allowlists with no default internet route",
@@ -717,8 +759,7 @@
717
759
  "Process Tree"
718
760
  ],
719
761
  "skills_referencing": [
720
- "kernel-lpe-triage",
721
- "mcp-agent-trust"
762
+ "defensive-countermeasure-mapping"
722
763
  ],
723
764
  "implementation_examples": [
724
765
  "Sysmon process-creation events with parent-child Sigma rules",
@@ -741,16 +782,30 @@
741
782
  "tactic": "Evict",
742
783
  "subtactic": "Credential Eviction",
743
784
  "description": "Forcibly invalidating cached or active authentication artifacts (tokens, session IDs, cached Kerberos tickets, browser SSO cookies) so that a compromised credential cannot be reused after detection. Distinct from credential rotation in that it acts on the live session state, not just the stored material.",
744
- "counters_attack_techniques": ["T1078", "T1550", "T1539", "AML.T0055"],
745
- "digital_artifacts_addressed": ["Authentication Session", "Access Token", "Browser Session", "Kerberos Ticket"],
746
- "skills_referencing": ["cred-stores", "identity-assurance", "incident-response-playbook"],
785
+ "counters_attack_techniques": [
786
+ "T1078",
787
+ "T1550",
788
+ "T1539",
789
+ "AML.T0055"
790
+ ],
791
+ "digital_artifacts_addressed": [
792
+ "Authentication Session",
793
+ "Access Token",
794
+ "Browser Session",
795
+ "Kerberos Ticket"
796
+ ],
797
+ "skills_referencing": [],
747
798
  "implementation_examples": [
748
799
  "OAuth refresh-token revocation on detected credential compromise",
749
800
  "klist purge + ticket-granting-service revocation on suspicious Kerberos use",
750
801
  "Browser-side single-sign-on cookie invalidation pushed via IDP signal",
751
802
  "Service-account JWT issuer kid-rotation followed by global verifier refresh"
752
803
  ],
753
- "framework_controls_partially_mapped": ["NIST-800-53-IA-5(1)", "NIST-800-53-AC-12", "ISO-27001-2022-A.5.18"],
804
+ "framework_controls_partially_mapped": [
805
+ "NIST-800-53-IA-5(1)",
806
+ "NIST-800-53-AC-12",
807
+ "ISO-27001-2022-A.5.18"
808
+ ],
754
809
  "ai_pipeline_applicability": "Applies to AI assistant identities (MCP server tokens, model-provider API keys). For ephemeral AI agents the cache invalidation is per-invocation; for long-lived AI sessions (assistant subscriptions), provider must expose a revoke API the operator can call.",
755
810
  "lag_notes": "AC-12 (session termination) speaks to user sessions; service-to-service token invalidation under credential compromise is rarely audited. Operationalization gap: most orgs lack the integration to actively invalidate on detection.",
756
811
  "last_verified": "2026-05-13"
@@ -761,16 +816,30 @@
761
816
  "tactic": "Detect",
762
817
  "subtactic": "Credential Activity Analysis",
763
818
  "description": "Recording and analyzing every access to credential stores (cloud secret managers, password vaults, KMS, environment-variable reads on privileged processes) to detect anomalous read patterns indicating credential theft or misuse.",
764
- "counters_attack_techniques": ["T1555", "T1552", "T1078", "AML.T0055"],
765
- "digital_artifacts_addressed": ["Credential Store Access Log", "Process Environment Variable Access"],
766
- "skills_referencing": ["cred-stores", "secrets", "dlp-gap-analysis"],
819
+ "counters_attack_techniques": [
820
+ "T1555",
821
+ "T1552",
822
+ "T1078",
823
+ "AML.T0055"
824
+ ],
825
+ "digital_artifacts_addressed": [
826
+ "Credential Store Access Log",
827
+ "Process Environment Variable Access"
828
+ ],
829
+ "skills_referencing": [
830
+ "cloud-iam-incident"
831
+ ],
767
832
  "implementation_examples": [
768
833
  "AWS Secrets Manager + CloudTrail GetSecretValue audit with anomaly baseline per principal",
769
834
  "HashiCorp Vault audit log forwarded to SIEM with per-policy read-rate alerting",
770
835
  "Linux audit on /proc/<pid>/environ reads outside the owning process",
771
836
  "GitHub Actions secret-access audit + repository-event correlation"
772
837
  ],
773
- "framework_controls_partially_mapped": ["NIST-800-53-AU-2", "NIST-800-53-AU-12", "ISO-27001-2022-A.8.15"],
838
+ "framework_controls_partially_mapped": [
839
+ "NIST-800-53-AU-2",
840
+ "NIST-800-53-AU-12",
841
+ "ISO-27001-2022-A.8.15"
842
+ ],
774
843
  "ai_pipeline_applicability": "Applies wherever AI agents fetch credentials at runtime (MCP server bootstrap, fine-tuning job startup). Serverless equivalent: cloud-provider native secret-fetch audit (Secrets Manager VPC endpoint logs, GCP Secret Manager IAM audit logs).",
775
844
  "lag_notes": "AU-2 prescribes audit event categories; framework controls do not require per-secret access baselining. Compliance audits accept 'logging is enabled' without requiring detection rules on read anomalies.",
776
845
  "last_verified": "2026-05-13"
@@ -781,16 +850,29 @@
781
850
  "tactic": "Harden",
782
851
  "subtactic": "Credential Hardening",
783
852
  "description": "Increasing the cryptographic and operational strength of credentials at rest and in transit — memory-hard password hashing, hardware-backed key storage, short credential lifetime, mandatory MFA on high-impact identities.",
784
- "counters_attack_techniques": ["T1110", "T1555", "T1552"],
785
- "digital_artifacts_addressed": ["Password Hash", "Private Key", "API Token", "Session Token"],
786
- "skills_referencing": ["crypto-codebase", "identity-assurance", "cred-stores"],
853
+ "counters_attack_techniques": [
854
+ "T1110",
855
+ "T1555",
856
+ "T1552"
857
+ ],
858
+ "digital_artifacts_addressed": [
859
+ "Password Hash",
860
+ "Private Key",
861
+ "API Token",
862
+ "Session Token"
863
+ ],
864
+ "skills_referencing": [],
787
865
  "implementation_examples": [
788
866
  "Argon2id password hashing with tuned m/t/p",
789
867
  "TPM/HSM-backed private keys (Windows Hello for Business, Apple Secure Enclave, AWS CloudHSM)",
790
868
  "Short-lived OIDC tokens with mandatory refresh-token rotation",
791
869
  "WebAuthn/passkey adoption replacing password authentication"
792
870
  ],
793
- "framework_controls_partially_mapped": ["NIST-800-53-IA-5", "NIST-800-53-SC-12", "NIST-SP-800-63B"],
871
+ "framework_controls_partially_mapped": [
872
+ "NIST-800-53-IA-5",
873
+ "NIST-800-53-SC-12",
874
+ "NIST-SP-800-63B"
875
+ ],
794
876
  "ai_pipeline_applicability": "Applies to credentials issued to AI agents — model-provider keys should be short-lived and rotated; MCP server tokens should use mTLS or signed JWTs rather than long-lived bearer secrets.",
795
877
  "lag_notes": "IA-5 covers authenticator strength categorically; framework audit rarely samples the actual KDF in use. SP 800-63B's 2022 iteration-count update (PBKDF2 ≥ 600,000) lags in many compliance attestations citing the 2017 numbers.",
796
878
  "last_verified": "2026-05-13"
@@ -801,9 +883,19 @@
801
883
  "tactic": "Isolate",
802
884
  "subtactic": "Execution Isolation",
803
885
  "description": "Constraining a process so that even successful exploitation cannot reach resources outside the isolation boundary — containers with read-only rootfs, sandboxed renderers, seccomp-restricted syscall sets, namespace-isolated workers, gVisor / Firecracker microVMs.",
804
- "counters_attack_techniques": ["T1611", "T1068", "T1055", "T1106"],
805
- "digital_artifacts_addressed": ["Process", "Container", "Sandbox", "Namespace"],
806
- "skills_referencing": ["container-runtime-security", "hardening"],
886
+ "counters_attack_techniques": [
887
+ "T1611",
888
+ "T1068",
889
+ "T1055",
890
+ "T1106"
891
+ ],
892
+ "digital_artifacts_addressed": [
893
+ "Process",
894
+ "Container",
895
+ "Sandbox",
896
+ "Namespace"
897
+ ],
898
+ "skills_referencing": [],
807
899
  "implementation_examples": [
808
900
  "Read-only container rootfs + tmpfs for ephemeral state",
809
901
  "seccomp-bpf default-deny syscall profiles per workload",
@@ -811,7 +903,11 @@
811
903
  "Firecracker microVMs for multi-tenant SaaS execution",
812
904
  "Linux user namespaces dropping CAP_SYS_ADMIN at process start"
813
905
  ],
814
- "framework_controls_partially_mapped": ["NIST-800-53-SC-39", "NIST-800-53-AC-4", "ISO-27001-2022-A.8.22"],
906
+ "framework_controls_partially_mapped": [
907
+ "NIST-800-53-SC-39",
908
+ "NIST-800-53-AC-4",
909
+ "ISO-27001-2022-A.8.22"
910
+ ],
815
911
  "ai_pipeline_applicability": "Critical for AI agent execution: untrusted-code-execution tools (interpreter, code-runner MCP servers) must run in a microVM or gVisor sandbox, not in the host AI's process. Serverless platforms provide this implicitly (Lambda firecracker, Cloud Run gVisor).",
816
912
  "lag_notes": "SC-39 covers process isolation conceptually; framework controls do not specify required isolation primitives. 'Containers' alone do not satisfy isolation without read-only rootfs + seccomp + capability dropping — controls rarely audit which container hardening is actually enforced.",
817
913
  "last_verified": "2026-05-13"
@@ -822,16 +918,29 @@
822
918
  "tactic": "Detect",
823
919
  "subtactic": "File Analysis",
824
920
  "description": "Inspecting file contents against rule sets (YARA, Sigma, custom regex, ML classifier) to detect malicious patterns, embedded secrets, or unauthorized content classes at rest or at egress.",
825
- "counters_attack_techniques": ["T1552.001", "T1552.004", "T1567", "AML.T0055"],
826
- "digital_artifacts_addressed": ["File Content", "Source Code", "Configuration File"],
827
- "skills_referencing": ["secrets", "dlp-gap-analysis", "cred-stores"],
921
+ "counters_attack_techniques": [
922
+ "T1552.001",
923
+ "T1552.004",
924
+ "T1567",
925
+ "AML.T0055"
926
+ ],
927
+ "digital_artifacts_addressed": [
928
+ "File Content",
929
+ "Source Code",
930
+ "Configuration File"
931
+ ],
932
+ "skills_referencing": [],
828
933
  "implementation_examples": [
829
934
  "gitleaks / trufflehog pre-commit and CI-time secret scanning",
830
935
  "YARA rules on uploaded files at SaaS file-upload boundaries",
831
936
  "DLP content-classification on outbound email + cloud-storage uploads",
832
937
  "AI prompt-content classification before egress to public LLM endpoints"
833
938
  ],
834
- "framework_controls_partially_mapped": ["NIST-800-53-SI-3", "NIST-800-53-SI-4", "ISO-27001-2022-A.8.12"],
939
+ "framework_controls_partially_mapped": [
940
+ "NIST-800-53-SI-3",
941
+ "NIST-800-53-SI-4",
942
+ "ISO-27001-2022-A.8.12"
943
+ ],
835
944
  "ai_pipeline_applicability": "Critical for AI exfil prevention: prompt content rules block sending sensitive data to public AI endpoints; retrieval-corpus content rules block injection of attacker-controlled documents. For RAG: per-document content classification at ingest.",
836
945
  "lag_notes": "SI-3 / SI-4 cover monitoring categorically; rule-set freshness and tuning are operational concerns rarely audited. DLP frameworks lag in covering AI prompts as an egress channel.",
837
946
  "last_verified": "2026-05-13"
@@ -842,9 +951,18 @@
842
951
  "tactic": "Isolate",
843
952
  "subtactic": "Execution Isolation",
844
953
  "description": "Using kernel primitives (namespaces, cgroups, seccomp, capabilities, LSMs, eBPF) to enforce isolation boundaries between processes that share the same kernel. Distinct from D3-EI in that the isolation is enforced inside a shared kernel rather than across a hypervisor or microVM boundary.",
845
- "counters_attack_techniques": ["T1055", "T1068", "T1611"],
846
- "digital_artifacts_addressed": ["Process", "Namespace", "cgroup", "LSM Profile"],
847
- "skills_referencing": ["kernel-lpe-triage", "hardening", "container-runtime-security"],
954
+ "counters_attack_techniques": [
955
+ "T1055",
956
+ "T1068",
957
+ "T1611"
958
+ ],
959
+ "digital_artifacts_addressed": [
960
+ "Process",
961
+ "Namespace",
962
+ "cgroup",
963
+ "LSM Profile"
964
+ ],
965
+ "skills_referencing": [],
848
966
  "implementation_examples": [
849
967
  "SELinux / AppArmor confinement profiles per workload",
850
968
  "Linux user namespaces + capability dropping (CAP_SYS_ADMIN removed)",
@@ -852,7 +970,10 @@
852
970
  "eBPF LSM hooks for fine-grained policy enforcement",
853
971
  "systemd hardening directives (ProtectSystem=strict, RestrictSUIDSGID, NoNewPrivileges)"
854
972
  ],
855
- "framework_controls_partially_mapped": ["NIST-800-53-SC-39", "NIST-800-53-AC-6"],
973
+ "framework_controls_partially_mapped": [
974
+ "NIST-800-53-SC-39",
975
+ "NIST-800-53-AC-6"
976
+ ],
856
977
  "ai_pipeline_applicability": "Less applicable on managed serverless (no kernel-tuning surface). Critical on self-managed hosts running MCP servers, AI build agents, training pipelines. Containerized AI runtimes still rely on kernel isolation primitives — a kernel LPE escapes the container.",
857
978
  "lag_notes": "SC-39 process isolation is named but not parameterized; framework controls accept 'containers are used' as evidence without auditing the kernel-level confinement layer. KASLR + SMEP + SMAP + KPTI presence is implicit not explicit in any framework control.",
858
979
  "last_verified": "2026-05-13"
@@ -863,16 +984,28 @@
863
984
  "tactic": "Detect",
864
985
  "subtactic": "Process Analysis",
865
986
  "description": "Recording and analyzing system calls made by processes to detect malicious behavior — unusual syscall patterns, attempts to disable security mechanisms, kernel exploitation primitives (e.g. unshare(2), ptrace(2) on unrelated PIDs, bpf(2) on unprivileged contexts).",
866
- "counters_attack_techniques": ["T1055", "T1068", "T1562", "T1106"],
867
- "digital_artifacts_addressed": ["System Call", "Process Behavior"],
868
- "skills_referencing": ["runtime", "kernel-lpe-triage"],
987
+ "counters_attack_techniques": [
988
+ "T1055",
989
+ "T1068",
990
+ "T1562",
991
+ "T1106"
992
+ ],
993
+ "digital_artifacts_addressed": [
994
+ "System Call",
995
+ "Process Behavior"
996
+ ],
997
+ "skills_referencing": [],
869
998
  "implementation_examples": [
870
999
  "Linux auditd with syscall rules (ausearch -k privesc)",
871
1000
  "Falco runtime rules on suspicious syscall sequences",
872
1001
  "eBPF-based tools (tetragon, tracee) for kernel-level visibility",
873
1002
  "Sysdig / inspector for container-syscall-anomaly detection"
874
1003
  ],
875
- "framework_controls_partially_mapped": ["NIST-800-53-SI-4", "NIST-800-53-AU-2", "ISO-27001-2022-A.8.16"],
1004
+ "framework_controls_partially_mapped": [
1005
+ "NIST-800-53-SI-4",
1006
+ "NIST-800-53-AU-2",
1007
+ "ISO-27001-2022-A.8.16"
1008
+ ],
876
1009
  "ai_pipeline_applicability": "Self-managed AI hosts: standard syscall monitoring applies. Serverless: equivalent is provider-side runtime telemetry (Lambda runtime API, GVisor sentry events). MCP server hosts especially: malicious MCP plugins often hit suspicious syscalls (ptrace, bpf, unshare).",
877
1010
  "lag_notes": "SI-4 prescribes monitoring at the system level abstractly; specific syscall analytics (which calls, which thresholds, which response) are deployment-team choices that framework audits do not sample.",
878
1011
  "last_verified": "2026-05-13"
@@ -883,16 +1016,29 @@
883
1016
  "tactic": "Detect",
884
1017
  "subtactic": "File Analysis",
885
1018
  "description": "Monitoring critical system files (auth databases, audit configurations, init scripts, boot loaders, sudoers, SSH authorized_keys) for unauthorized modification — file integrity monitoring with cryptographic baselines and immutable-write enforcement.",
886
- "counters_attack_techniques": ["T1543", "T1547", "T1098", "T1562.001"],
887
- "digital_artifacts_addressed": ["System File", "Configuration File", "File Hash"],
888
- "skills_referencing": ["runtime", "hardening", "incident-response-playbook"],
1019
+ "counters_attack_techniques": [
1020
+ "T1543",
1021
+ "T1547",
1022
+ "T1098",
1023
+ "T1562.001"
1024
+ ],
1025
+ "digital_artifacts_addressed": [
1026
+ "System File",
1027
+ "Configuration File",
1028
+ "File Hash"
1029
+ ],
1030
+ "skills_referencing": [],
889
1031
  "implementation_examples": [
890
1032
  "AIDE / Tripwire / OSSEC file-integrity baselines on /etc, /usr/bin, /sbin",
891
1033
  "Auditd watch rules on /etc/passwd, /etc/shadow, /etc/sudoers, ~/.ssh/authorized_keys",
892
1034
  "Linux IMA-EVM measured boot extending into runtime FIM",
893
1035
  "AWS Config rules monitoring IAM policy file analogs (managed-policy versions)"
894
1036
  ],
895
- "framework_controls_partially_mapped": ["NIST-800-53-SI-7", "NIST-800-53-AU-2", "ISO-27001-2022-A.8.13"],
1037
+ "framework_controls_partially_mapped": [
1038
+ "NIST-800-53-SI-7",
1039
+ "NIST-800-53-AU-2",
1040
+ "ISO-27001-2022-A.8.13"
1041
+ ],
896
1042
  "ai_pipeline_applicability": "Self-managed AI hosts: standard FIM applies to MCP server configs, ~/.claude, ~/.cursor settings. Serverless: equivalent is image-immutability + read-only rootfs (modifications outside writable tmpfs are structurally impossible).",
897
1043
  "lag_notes": "SI-7 covers software/firmware integrity; user-space configuration FIM is implicit not explicit. Framework audits accept 'FIM is deployed' without sampling whether the rule set covers AI-assistant config paths that have become high-value targets.",
898
1044
  "last_verified": "2026-05-13"