@blamejs/exceptd-skills 0.12.27 → 0.12.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +4 -1
- package/CHANGELOG.md +54 -0
- package/bin/exceptd.js +30 -20
- package/data/_indexes/_meta.json +26 -23
- package/data/_indexes/activity-feed.json +32 -11
- package/data/_indexes/catalog-summaries.json +3 -3
- package/data/_indexes/chains.json +965 -35
- package/data/_indexes/currency.json +68 -41
- package/data/_indexes/frequency.json +428 -124
- package/data/_indexes/handoff-dag.json +70 -19
- package/data/_indexes/jurisdiction-map.json +37 -12
- package/data/_indexes/section-offsets.json +282 -0
- package/data/_indexes/stale-content.json +3 -3
- package/data/_indexes/summary-cards.json +198 -0
- package/data/_indexes/token-budget.json +168 -3
- package/data/_indexes/trigger-table.json +190 -0
- package/data/_indexes/xref.json +145 -2
- package/data/atlas-ttps.json +61 -111
- package/data/attack-techniques.json +104 -19
- package/data/cve-catalog.json +101 -45
- package/data/cwe-catalog.json +149 -94
- package/data/d3fend-catalog.json +199 -53
- package/data/framework-control-gaps.json +1679 -89
- package/data/playbooks/cloud-iam-incident.json +1351 -0
- package/data/playbooks/crypto-codebase.json +1 -1
- package/data/playbooks/idp-incident.json +1259 -0
- package/data/playbooks/ransomware.json +1407 -0
- package/data/rfc-references.json +58 -59
- package/lib/exit-codes.js +2 -0
- package/lib/playbook-runner.js +25 -1
- package/manifest-snapshot.json +220 -3
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +287 -45
- package/package.json +3 -2
- package/sbom.cdx.json +1854 -11
- package/scripts/backfill-theater-test.js +806 -0
- package/scripts/refresh-reverse-refs.js +171 -0
- package/scripts/refresh-sbom.js +155 -8
- package/skills/cloud-iam-incident/skill.md +419 -0
- package/skills/idp-incident-response/skill.md +352 -0
- package/skills/ransomware-response/skill.md +374 -0
|
@@ -3729,6 +3729,100 @@
|
|
|
3729
3729
|
}
|
|
3730
3730
|
]
|
|
3731
3731
|
},
|
|
3732
|
+
"ransomware-response": {
|
|
3733
|
+
"path": "skills/ransomware-response/skill.md",
|
|
3734
|
+
"total_bytes": 48211,
|
|
3735
|
+
"total_lines": 375,
|
|
3736
|
+
"frontmatter": {
|
|
3737
|
+
"line_start": 1,
|
|
3738
|
+
"line_end": 70,
|
|
3739
|
+
"byte_start": 0,
|
|
3740
|
+
"byte_end": 3027
|
|
3741
|
+
},
|
|
3742
|
+
"sections": [
|
|
3743
|
+
{
|
|
3744
|
+
"name": "Threat Context (mid-2026)",
|
|
3745
|
+
"normalized_name": "threat-context",
|
|
3746
|
+
"line": 80,
|
|
3747
|
+
"byte_start": 4868,
|
|
3748
|
+
"byte_end": 10227,
|
|
3749
|
+
"bytes": 5359,
|
|
3750
|
+
"h3_count": 0
|
|
3751
|
+
},
|
|
3752
|
+
{
|
|
3753
|
+
"name": "Framework Lag Declaration",
|
|
3754
|
+
"normalized_name": "framework-lag-declaration",
|
|
3755
|
+
"line": 97,
|
|
3756
|
+
"byte_start": 10227,
|
|
3757
|
+
"byte_end": 17022,
|
|
3758
|
+
"bytes": 6795,
|
|
3759
|
+
"h3_count": 0
|
|
3760
|
+
},
|
|
3761
|
+
{
|
|
3762
|
+
"name": "TTP Mapping",
|
|
3763
|
+
"normalized_name": "ttp-mapping",
|
|
3764
|
+
"line": 125,
|
|
3765
|
+
"byte_start": 17022,
|
|
3766
|
+
"byte_end": 19241,
|
|
3767
|
+
"bytes": 2219,
|
|
3768
|
+
"h3_count": 0
|
|
3769
|
+
},
|
|
3770
|
+
{
|
|
3771
|
+
"name": "Exploit Availability Matrix",
|
|
3772
|
+
"normalized_name": "exploit-availability-matrix",
|
|
3773
|
+
"line": 140,
|
|
3774
|
+
"byte_start": 19241,
|
|
3775
|
+
"byte_end": 21833,
|
|
3776
|
+
"bytes": 2592,
|
|
3777
|
+
"h3_count": 0
|
|
3778
|
+
},
|
|
3779
|
+
{
|
|
3780
|
+
"name": "Analysis Procedure",
|
|
3781
|
+
"normalized_name": "analysis-procedure",
|
|
3782
|
+
"line": 160,
|
|
3783
|
+
"byte_start": 21833,
|
|
3784
|
+
"byte_end": 33341,
|
|
3785
|
+
"bytes": 11508,
|
|
3786
|
+
"h3_count": 10
|
|
3787
|
+
},
|
|
3788
|
+
{
|
|
3789
|
+
"name": "Output Format",
|
|
3790
|
+
"normalized_name": "output-format",
|
|
3791
|
+
"line": 222,
|
|
3792
|
+
"byte_start": 33341,
|
|
3793
|
+
"byte_end": 37152,
|
|
3794
|
+
"bytes": 3811,
|
|
3795
|
+
"h3_count": 6
|
|
3796
|
+
},
|
|
3797
|
+
{
|
|
3798
|
+
"name": "Compliance Theater Check",
|
|
3799
|
+
"normalized_name": "compliance-theater-check",
|
|
3800
|
+
"line": 325,
|
|
3801
|
+
"byte_start": 37152,
|
|
3802
|
+
"byte_end": 40939,
|
|
3803
|
+
"bytes": 3787,
|
|
3804
|
+
"h3_count": 0
|
|
3805
|
+
},
|
|
3806
|
+
{
|
|
3807
|
+
"name": "Defensive Countermeasure Mapping",
|
|
3808
|
+
"normalized_name": "defensive-countermeasure-mapping",
|
|
3809
|
+
"line": 341,
|
|
3810
|
+
"byte_start": 40939,
|
|
3811
|
+
"byte_end": 44725,
|
|
3812
|
+
"bytes": 3786,
|
|
3813
|
+
"h3_count": 0
|
|
3814
|
+
},
|
|
3815
|
+
{
|
|
3816
|
+
"name": "Hand-Off / Related Skills",
|
|
3817
|
+
"normalized_name": "hand-off",
|
|
3818
|
+
"line": 360,
|
|
3819
|
+
"byte_start": 44725,
|
|
3820
|
+
"byte_end": 48211,
|
|
3821
|
+
"bytes": 3486,
|
|
3822
|
+
"h3_count": 0
|
|
3823
|
+
}
|
|
3824
|
+
]
|
|
3825
|
+
},
|
|
3732
3826
|
"email-security-anti-phishing": {
|
|
3733
3827
|
"path": "skills/email-security-anti-phishing/skill.md",
|
|
3734
3828
|
"total_bytes": 26531,
|
|
@@ -3916,6 +4010,194 @@
|
|
|
3916
4010
|
"h3_count": 0
|
|
3917
4011
|
}
|
|
3918
4012
|
]
|
|
4013
|
+
},
|
|
4014
|
+
"cloud-iam-incident": {
|
|
4015
|
+
"path": "skills/cloud-iam-incident/skill.md",
|
|
4016
|
+
"total_bytes": 44433,
|
|
4017
|
+
"total_lines": 420,
|
|
4018
|
+
"frontmatter": {
|
|
4019
|
+
"line_start": 1,
|
|
4020
|
+
"line_end": 81,
|
|
4021
|
+
"byte_start": 0,
|
|
4022
|
+
"byte_end": 2834
|
|
4023
|
+
},
|
|
4024
|
+
"sections": [
|
|
4025
|
+
{
|
|
4026
|
+
"name": "Threat Context (mid-2026)",
|
|
4027
|
+
"normalized_name": "threat-context",
|
|
4028
|
+
"line": 85,
|
|
4029
|
+
"byte_start": 2877,
|
|
4030
|
+
"byte_end": 8663,
|
|
4031
|
+
"bytes": 5786,
|
|
4032
|
+
"h3_count": 0
|
|
4033
|
+
},
|
|
4034
|
+
{
|
|
4035
|
+
"name": "Framework Lag Declaration",
|
|
4036
|
+
"normalized_name": "framework-lag-declaration",
|
|
4037
|
+
"line": 118,
|
|
4038
|
+
"byte_start": 8663,
|
|
4039
|
+
"byte_end": 14979,
|
|
4040
|
+
"bytes": 6316,
|
|
4041
|
+
"h3_count": 0
|
|
4042
|
+
},
|
|
4043
|
+
{
|
|
4044
|
+
"name": "TTP Mapping",
|
|
4045
|
+
"normalized_name": "ttp-mapping",
|
|
4046
|
+
"line": 147,
|
|
4047
|
+
"byte_start": 14979,
|
|
4048
|
+
"byte_end": 19519,
|
|
4049
|
+
"bytes": 4540,
|
|
4050
|
+
"h3_count": 0
|
|
4051
|
+
},
|
|
4052
|
+
{
|
|
4053
|
+
"name": "Exploit Availability Matrix",
|
|
4054
|
+
"normalized_name": "exploit-availability-matrix",
|
|
4055
|
+
"line": 167,
|
|
4056
|
+
"byte_start": 19519,
|
|
4057
|
+
"byte_end": 22898,
|
|
4058
|
+
"bytes": 3379,
|
|
4059
|
+
"h3_count": 0
|
|
4060
|
+
},
|
|
4061
|
+
{
|
|
4062
|
+
"name": "Analysis Procedure",
|
|
4063
|
+
"normalized_name": "analysis-procedure",
|
|
4064
|
+
"line": 189,
|
|
4065
|
+
"byte_start": 22898,
|
|
4066
|
+
"byte_end": 30523,
|
|
4067
|
+
"bytes": 7625,
|
|
4068
|
+
"h3_count": 12
|
|
4069
|
+
},
|
|
4070
|
+
{
|
|
4071
|
+
"name": "Output Format",
|
|
4072
|
+
"normalized_name": "output-format",
|
|
4073
|
+
"line": 279,
|
|
4074
|
+
"byte_start": 30523,
|
|
4075
|
+
"byte_end": 32721,
|
|
4076
|
+
"bytes": 2198,
|
|
4077
|
+
"h3_count": 15
|
|
4078
|
+
},
|
|
4079
|
+
{
|
|
4080
|
+
"name": "Compliance Theater Check",
|
|
4081
|
+
"normalized_name": "compliance-theater-check",
|
|
4082
|
+
"line": 342,
|
|
4083
|
+
"byte_start": 32721,
|
|
4084
|
+
"byte_end": 37320,
|
|
4085
|
+
"bytes": 4599,
|
|
4086
|
+
"h3_count": 0
|
|
4087
|
+
},
|
|
4088
|
+
{
|
|
4089
|
+
"name": "Defensive Countermeasure Mapping",
|
|
4090
|
+
"normalized_name": "defensive-countermeasure-mapping",
|
|
4091
|
+
"line": 378,
|
|
4092
|
+
"byte_start": 37320,
|
|
4093
|
+
"byte_end": 41396,
|
|
4094
|
+
"bytes": 4076,
|
|
4095
|
+
"h3_count": 0
|
|
4096
|
+
},
|
|
4097
|
+
{
|
|
4098
|
+
"name": "Hand-Off / Related Skills",
|
|
4099
|
+
"normalized_name": "hand-off",
|
|
4100
|
+
"line": 400,
|
|
4101
|
+
"byte_start": 41396,
|
|
4102
|
+
"byte_end": 44433,
|
|
4103
|
+
"bytes": 3037,
|
|
4104
|
+
"h3_count": 0
|
|
4105
|
+
}
|
|
4106
|
+
]
|
|
4107
|
+
},
|
|
4108
|
+
"idp-incident-response": {
|
|
4109
|
+
"path": "skills/idp-incident-response/skill.md",
|
|
4110
|
+
"total_bytes": 46225,
|
|
4111
|
+
"total_lines": 353,
|
|
4112
|
+
"frontmatter": {
|
|
4113
|
+
"line_start": 1,
|
|
4114
|
+
"line_end": 83,
|
|
4115
|
+
"byte_start": 0,
|
|
4116
|
+
"byte_end": 2814
|
|
4117
|
+
},
|
|
4118
|
+
"sections": [
|
|
4119
|
+
{
|
|
4120
|
+
"name": "Threat Context (mid-2026)",
|
|
4121
|
+
"normalized_name": "threat-context",
|
|
4122
|
+
"line": 87,
|
|
4123
|
+
"byte_start": 2865,
|
|
4124
|
+
"byte_end": 8702,
|
|
4125
|
+
"bytes": 5837,
|
|
4126
|
+
"h3_count": 0
|
|
4127
|
+
},
|
|
4128
|
+
{
|
|
4129
|
+
"name": "Framework Lag Declaration",
|
|
4130
|
+
"normalized_name": "framework-lag-declaration",
|
|
4131
|
+
"line": 107,
|
|
4132
|
+
"byte_start": 8702,
|
|
4133
|
+
"byte_end": 15336,
|
|
4134
|
+
"bytes": 6634,
|
|
4135
|
+
"h3_count": 0
|
|
4136
|
+
},
|
|
4137
|
+
{
|
|
4138
|
+
"name": "TTP Mapping",
|
|
4139
|
+
"normalized_name": "ttp-mapping",
|
|
4140
|
+
"line": 128,
|
|
4141
|
+
"byte_start": 15336,
|
|
4142
|
+
"byte_end": 19417,
|
|
4143
|
+
"bytes": 4081,
|
|
4144
|
+
"h3_count": 0
|
|
4145
|
+
},
|
|
4146
|
+
{
|
|
4147
|
+
"name": "Exploit Availability Matrix",
|
|
4148
|
+
"normalized_name": "exploit-availability-matrix",
|
|
4149
|
+
"line": 145,
|
|
4150
|
+
"byte_start": 19417,
|
|
4151
|
+
"byte_end": 23132,
|
|
4152
|
+
"bytes": 3715,
|
|
4153
|
+
"h3_count": 0
|
|
4154
|
+
},
|
|
4155
|
+
{
|
|
4156
|
+
"name": "Analysis Procedure",
|
|
4157
|
+
"normalized_name": "analysis-procedure",
|
|
4158
|
+
"line": 163,
|
|
4159
|
+
"byte_start": 23132,
|
|
4160
|
+
"byte_end": 30218,
|
|
4161
|
+
"bytes": 7086,
|
|
4162
|
+
"h3_count": 10
|
|
4163
|
+
},
|
|
4164
|
+
{
|
|
4165
|
+
"name": "Output Format",
|
|
4166
|
+
"normalized_name": "output-format",
|
|
4167
|
+
"line": 224,
|
|
4168
|
+
"byte_start": 30218,
|
|
4169
|
+
"byte_end": 33401,
|
|
4170
|
+
"bytes": 3183,
|
|
4171
|
+
"h3_count": 16
|
|
4172
|
+
},
|
|
4173
|
+
{
|
|
4174
|
+
"name": "Compliance Theater Check",
|
|
4175
|
+
"normalized_name": "compliance-theater-check",
|
|
4176
|
+
"line": 293,
|
|
4177
|
+
"byte_start": 33401,
|
|
4178
|
+
"byte_end": 37862,
|
|
4179
|
+
"bytes": 4461,
|
|
4180
|
+
"h3_count": 0
|
|
4181
|
+
},
|
|
4182
|
+
{
|
|
4183
|
+
"name": "Defensive Countermeasure Mapping",
|
|
4184
|
+
"normalized_name": "defensive-countermeasure-mapping",
|
|
4185
|
+
"line": 320,
|
|
4186
|
+
"byte_start": 37862,
|
|
4187
|
+
"byte_end": 42384,
|
|
4188
|
+
"bytes": 4522,
|
|
4189
|
+
"h3_count": 0
|
|
4190
|
+
},
|
|
4191
|
+
{
|
|
4192
|
+
"name": "Hand-Off / Related Skills",
|
|
4193
|
+
"normalized_name": "hand-off",
|
|
4194
|
+
"line": 335,
|
|
4195
|
+
"byte_start": 42384,
|
|
4196
|
+
"byte_end": 46225,
|
|
4197
|
+
"bytes": 3841,
|
|
4198
|
+
"h3_count": 0
|
|
4199
|
+
}
|
|
4200
|
+
]
|
|
3919
4201
|
}
|
|
3920
4202
|
}
|
|
3921
4203
|
}
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"_meta": {
|
|
3
3
|
"schema_version": "1.0.0",
|
|
4
|
-
"reference_date": "2026-05-
|
|
4
|
+
"reference_date": "2026-05-15",
|
|
5
5
|
"note": "Stale-content snapshot derived from audit-cross-skill checks. Re-runs of build-indexes against the same inputs produce byte-identical output (reference_date is manifest.threat_review_date, not 'now'). audit-cross-skill.js remains the canonical interactive audit.",
|
|
6
6
|
"finding_count": 3,
|
|
7
7
|
"by_severity": {
|
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
"severity": "medium",
|
|
16
16
|
"category": "badge_drift",
|
|
17
17
|
"artifact": "README.md",
|
|
18
|
-
"detail": "skills badge shows 38, manifest has
|
|
18
|
+
"detail": "skills badge shows 38, manifest has 42"
|
|
19
19
|
},
|
|
20
20
|
{
|
|
21
21
|
"severity": "medium",
|
|
@@ -27,7 +27,7 @@
|
|
|
27
27
|
"severity": "medium",
|
|
28
28
|
"category": "researcher_claim_drift",
|
|
29
29
|
"artifact": "skills/researcher/skill.md",
|
|
30
|
-
"detail": "claims 37 specialized skills downstream; live count is
|
|
30
|
+
"detail": "claims 37 specialized skills downstream; live count is 41"
|
|
31
31
|
}
|
|
32
32
|
]
|
|
33
33
|
}
|
|
@@ -1699,6 +1699,60 @@
|
|
|
1699
1699
|
"zeroday-gap-learn"
|
|
1700
1700
|
]
|
|
1701
1701
|
},
|
|
1702
|
+
"ransomware-response": {
|
|
1703
|
+
"description": "Ransomware-specific incident response — OFAC SDN sanctions screening as payment-posture blocker, EU Reg 2014/833 + UK OFSI + AU DFAT + JP MOF cross-jurisdiction sanctions lookups, decryptor availability via No More Ransom + vendor-specific catalogs, cyber-insurance carrier 24h notification, negotiator-engagement legal posture, immutable-backup viability test, PHI exfil-before-encrypt as distinct breach class, parallel jurisdiction clocks",
|
|
1704
|
+
"threat_context_excerpt": "Ransomware is the highest-volume critical-infrastructure incident class and the dominant economic-harm cyber category, and its operational shape changed materially between the 2020-2022 frame and the 2024-2026 frame.",
|
|
1705
|
+
"produces": "The skill produces six ransomware-specific artifacts that augment the parent IR playbook's seven artifacts.\n\n### 1. Encryption Confirmation Record\n\n```\nIncident ID: INC-<YYYY>-<NNNN>\nEncryption confirmed: <yes/no>\nEncrypted-host count: <N>\nFamily fingerprint: <family + confidence>\nRansom note IoCs:\n - Leak-site URL: <onion address>\n - Contact identifier: <email/Tox/Session>\n - Crypto-wallet addresses: <list>\n - Family signature: <text fingerprint>\nShadow Copy deletion observed: <yes/no + timestamp + invoking process>\nLiving-off-the-land tools observed: <list — PsExec/WMI/PowerShell/AnyDesk ...",
|
|
1706
|
+
"key_xrefs": {
|
|
1707
|
+
"cwe_refs": [
|
|
1708
|
+
"CWE-287",
|
|
1709
|
+
"CWE-798"
|
|
1710
|
+
],
|
|
1711
|
+
"d3fend_refs": [
|
|
1712
|
+
"D3-RPA",
|
|
1713
|
+
"D3-NTA",
|
|
1714
|
+
"D3-IOPR",
|
|
1715
|
+
"D3-CSPP"
|
|
1716
|
+
],
|
|
1717
|
+
"framework_gaps": [
|
|
1718
|
+
"OFAC-SDN-Payment-Block",
|
|
1719
|
+
"Insurance-Carrier-24h-Notification",
|
|
1720
|
+
"EU-Sanctions-Reg-2014-833-Cyber",
|
|
1721
|
+
"Immutable-Backup-Recovery",
|
|
1722
|
+
"Decryptor-Availability-Pre-Decision",
|
|
1723
|
+
"PHI-Exfil-Before-Encrypt-Breach-Class"
|
|
1724
|
+
],
|
|
1725
|
+
"atlas_refs": [],
|
|
1726
|
+
"attack_refs": [
|
|
1727
|
+
"T1486",
|
|
1728
|
+
"T1567",
|
|
1729
|
+
"T1078",
|
|
1730
|
+
"T1059"
|
|
1731
|
+
],
|
|
1732
|
+
"rfc_refs": [],
|
|
1733
|
+
"dlp_refs": []
|
|
1734
|
+
},
|
|
1735
|
+
"trigger_count": 22,
|
|
1736
|
+
"atlas_count": 0,
|
|
1737
|
+
"attack_count": 4,
|
|
1738
|
+
"framework_gap_count": 6,
|
|
1739
|
+
"cwe_count": 2,
|
|
1740
|
+
"d3fend_count": 4,
|
|
1741
|
+
"rfc_count": 0,
|
|
1742
|
+
"last_threat_review": "2026-05-15",
|
|
1743
|
+
"path": "skills/ransomware-response/skill.md",
|
|
1744
|
+
"handoff_targets": [
|
|
1745
|
+
"compliance-theater",
|
|
1746
|
+
"coordinated-vuln-disclosure",
|
|
1747
|
+
"framework-gap-analysis",
|
|
1748
|
+
"incident-response-playbook",
|
|
1749
|
+
"sector-financial",
|
|
1750
|
+
"sector-healthcare",
|
|
1751
|
+
"skill-update-loop",
|
|
1752
|
+
"threat-model-currency",
|
|
1753
|
+
"zeroday-gap-learn"
|
|
1754
|
+
]
|
|
1755
|
+
},
|
|
1702
1756
|
"email-security-anti-phishing": {
|
|
1703
1757
|
"description": "Email security + anti-phishing for mid-2026 — SPF/DKIM/DMARC/BIMI/ARC/MTA-STS/TLSRPT, AI-augmented phishing (vishing, deepfake video, hyperpersonalized email), Business Email Compromise, secure email gateways",
|
|
1704
1758
|
"threat_context_excerpt": "Phishing remained the #1 initial-access vector through 2025 (Verizon DBIR 2025) and into 2026. The structural shift between 2024 and 2026 is **AI-augmentation of the phishing kill-chain** — content generation, voice synthesis, and live deepfake video have all collapsed from \"demonstrated in research\" to \"deployed against treasury, IT-helpdesk, and executive offices.\"",
|
|
@@ -1785,6 +1839,150 @@
|
|
|
1785
1839
|
"incident-response-playbook",
|
|
1786
1840
|
"sector-healthcare"
|
|
1787
1841
|
]
|
|
1842
|
+
},
|
|
1843
|
+
"cloud-iam-incident": {
|
|
1844
|
+
"description": "Cloud-IAM incident response for AWS / GCP / Azure — account takeover, IAM role assumption abuse, access-key compromise, cross-account assume-role chains, federated-trust attacks, IMDS metadata exfiltration, and Snowflake-AA24-class IdP-to-cloud credential reuse",
|
|
1845
|
+
"threat_context_excerpt": "Cloud-IAM compromise has been the dominant cloud-breach root cause across all three major hyperscalers (AWS, GCP, Azure) from 2024 through mid-2026. The threat surface has shifted materially since 2023 and the conventional defensive posture — Service Control Policies, root-account MFA, posture tools like AWS Security Hub / GCP Security Command Center / Azure Defender for Cloud, and quarterly access reviews — captures progressively less of the actual attack surface as adversary capability evolves.",
|
|
1846
|
+
"produces": "The output is the operator-facing cloud-IAM incident assessment. Every section is mandatory; missing data is reported as \"no evidence\" so absence is auditable. The audit-log coverage table anchors the entire assessment — gaps there propagate to every downstream finding as reduced confidence. Produce this structure verbatim:\n\n```\n## Cloud IAM Incident Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Account(s) in scope:** [list]\n**Cloud provider(s):** [AWS / GCP / Azure]\n**Regulatory exposure:** [EU GDPR / NIS2 / DORA / UK / NYDFS / AU / SG / JP / CA / ...]\n**Critical or important functions in sco ...",
|
|
1847
|
+
"key_xrefs": {
|
|
1848
|
+
"cwe_refs": [
|
|
1849
|
+
"CWE-287",
|
|
1850
|
+
"CWE-522",
|
|
1851
|
+
"CWE-798",
|
|
1852
|
+
"CWE-863",
|
|
1853
|
+
"CWE-732",
|
|
1854
|
+
"CWE-269"
|
|
1855
|
+
],
|
|
1856
|
+
"d3fend_refs": [
|
|
1857
|
+
"D3-MFA",
|
|
1858
|
+
"D3-CBAN",
|
|
1859
|
+
"D3-NTA",
|
|
1860
|
+
"D3-IOPR",
|
|
1861
|
+
"D3-CAA"
|
|
1862
|
+
],
|
|
1863
|
+
"framework_gaps": [
|
|
1864
|
+
"FedRAMP-IL5-IAM-Federated",
|
|
1865
|
+
"CISA-Snowflake-AA24-IdP-Cloud",
|
|
1866
|
+
"NIST-800-53-AC-2-Cross-Account",
|
|
1867
|
+
"ISO-27017-Cloud-IAM",
|
|
1868
|
+
"SOC2-CC6-Access-Key-Leak-Public-Repo",
|
|
1869
|
+
"AWS-Security-Hub-Coverage-Gap",
|
|
1870
|
+
"UK-CAF-B2-Cloud-IAM",
|
|
1871
|
+
"AU-ISM-1546-Cloud-Service-Account"
|
|
1872
|
+
],
|
|
1873
|
+
"atlas_refs": [
|
|
1874
|
+
"AML.T0051"
|
|
1875
|
+
],
|
|
1876
|
+
"attack_refs": [
|
|
1877
|
+
"T1078",
|
|
1878
|
+
"T1078.004",
|
|
1879
|
+
"T1098.001",
|
|
1880
|
+
"T1552.005",
|
|
1881
|
+
"T1580",
|
|
1882
|
+
"T1538"
|
|
1883
|
+
],
|
|
1884
|
+
"rfc_refs": [
|
|
1885
|
+
"RFC-8693",
|
|
1886
|
+
"RFC-7519",
|
|
1887
|
+
"RFC-8725",
|
|
1888
|
+
"RFC-9068"
|
|
1889
|
+
],
|
|
1890
|
+
"dlp_refs": []
|
|
1891
|
+
},
|
|
1892
|
+
"trigger_count": 18,
|
|
1893
|
+
"atlas_count": 1,
|
|
1894
|
+
"attack_count": 6,
|
|
1895
|
+
"framework_gap_count": 8,
|
|
1896
|
+
"cwe_count": 6,
|
|
1897
|
+
"d3fend_count": 5,
|
|
1898
|
+
"rfc_count": 4,
|
|
1899
|
+
"last_threat_review": "2026-05-15",
|
|
1900
|
+
"path": "skills/cloud-iam-incident/skill.md",
|
|
1901
|
+
"handoff_targets": [
|
|
1902
|
+
"ai-attack-surface",
|
|
1903
|
+
"cloud-security",
|
|
1904
|
+
"compliance-theater",
|
|
1905
|
+
"coordinated-vuln-disclosure",
|
|
1906
|
+
"dlp-gap-analysis",
|
|
1907
|
+
"framework-gap-analysis",
|
|
1908
|
+
"identity-assurance",
|
|
1909
|
+
"incident-response-playbook",
|
|
1910
|
+
"mcp-agent-trust",
|
|
1911
|
+
"policy-exception-gen",
|
|
1912
|
+
"sector-federal-government",
|
|
1913
|
+
"sector-financial",
|
|
1914
|
+
"sector-healthcare",
|
|
1915
|
+
"supply-chain-integrity"
|
|
1916
|
+
]
|
|
1917
|
+
},
|
|
1918
|
+
"idp-incident-response": {
|
|
1919
|
+
"description": "Identity-provider incident response for mid-2026 — Okta, Entra ID, Auth0, Ping, OneLogin tenant compromise, federated-trust abuse, OAuth app consent abuse, Midnight Blizzard and Scattered Spider TTPs against the IdP control plane",
|
|
1920
|
+
"threat_context_excerpt": "Identity-provider tenants are the highest-blast-radius single object in a modern cloud estate. The IdP issues every authentication outcome, federates every OAuth scope, and serves as the source-of-truth for privileged-role assignment across the downstream SaaS / cloud / on-prem fleet. 2023-2026 incident-response data shows five recurring themes, each of which now drives both attacker tradecraft and the framework-lag conversation.",
|
|
1921
|
+
"produces": "The output is the operator-facing IdP-tenant compromise assessment. Every section is mandatory; empty tables remain present with a \"no evidence\" row to make absence auditable. The jurisdiction-clock snapshot anchors every subsequent timestamp; downstream tooling parses the deadline column for SLA enforcement. Produce this structure verbatim:\n\n```\n## IdP-Tenant Compromise Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Tenant ID (hashed):** [hashed_tenant_identifier]\n**IdP Vendor:** [Okta / Entra ID / Auth0 / Ping / OneLogin / hybrid]\n**Regulatory exposure:** [EU DORA / EU NIS2 / EU GDPR / UK / U ...",
|
|
1922
|
+
"key_xrefs": {
|
|
1923
|
+
"cwe_refs": [
|
|
1924
|
+
"CWE-287",
|
|
1925
|
+
"CWE-863",
|
|
1926
|
+
"CWE-269",
|
|
1927
|
+
"CWE-284",
|
|
1928
|
+
"CWE-522",
|
|
1929
|
+
"CWE-345"
|
|
1930
|
+
],
|
|
1931
|
+
"d3fend_refs": [
|
|
1932
|
+
"D3-MFA",
|
|
1933
|
+
"D3-CBAN",
|
|
1934
|
+
"D3-NTA",
|
|
1935
|
+
"D3-IOPR"
|
|
1936
|
+
],
|
|
1937
|
+
"framework_gaps": [
|
|
1938
|
+
"NIST-800-53-IA-5-Federated",
|
|
1939
|
+
"ISO-27001-2022-A.5.16-Federated",
|
|
1940
|
+
"SOC2-CC6-OAuth-Consent",
|
|
1941
|
+
"UK-CAF-B2-IdP-Tenant",
|
|
1942
|
+
"AU-ISM-1559-IdP",
|
|
1943
|
+
"NIS2-Art-21-Federated-Identity",
|
|
1944
|
+
"DORA-Art-19-IdP-4h",
|
|
1945
|
+
"OFAC-Sanctions-Threat-Actor-Negotiation"
|
|
1946
|
+
],
|
|
1947
|
+
"atlas_refs": [],
|
|
1948
|
+
"attack_refs": [
|
|
1949
|
+
"T1078.004",
|
|
1950
|
+
"T1556.007",
|
|
1951
|
+
"T1098.001",
|
|
1952
|
+
"T1606.002",
|
|
1953
|
+
"T1199"
|
|
1954
|
+
],
|
|
1955
|
+
"rfc_refs": [
|
|
1956
|
+
"RFC-7519",
|
|
1957
|
+
"RFC-8725",
|
|
1958
|
+
"RFC-7591",
|
|
1959
|
+
"RFC-9421"
|
|
1960
|
+
],
|
|
1961
|
+
"dlp_refs": []
|
|
1962
|
+
},
|
|
1963
|
+
"trigger_count": 24,
|
|
1964
|
+
"atlas_count": 0,
|
|
1965
|
+
"attack_count": 5,
|
|
1966
|
+
"framework_gap_count": 8,
|
|
1967
|
+
"cwe_count": 6,
|
|
1968
|
+
"d3fend_count": 4,
|
|
1969
|
+
"rfc_count": 4,
|
|
1970
|
+
"last_threat_review": "2026-05-15",
|
|
1971
|
+
"path": "skills/idp-incident-response/skill.md",
|
|
1972
|
+
"handoff_targets": [
|
|
1973
|
+
"ai-attack-surface",
|
|
1974
|
+
"compliance-theater",
|
|
1975
|
+
"coordinated-vuln-disclosure",
|
|
1976
|
+
"dlp-gap-analysis",
|
|
1977
|
+
"framework-gap-analysis",
|
|
1978
|
+
"identity-assurance",
|
|
1979
|
+
"incident-response-playbook",
|
|
1980
|
+
"mcp-agent-trust",
|
|
1981
|
+
"policy-exception-gen",
|
|
1982
|
+
"sector-federal-government",
|
|
1983
|
+
"sector-financial",
|
|
1984
|
+
"sector-telecom"
|
|
1985
|
+
]
|
|
1788
1986
|
}
|
|
1789
1987
|
}
|
|
1790
1988
|
}
|