@blamejs/exceptd-skills 0.12.27 → 0.12.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +4 -1
- package/CHANGELOG.md +54 -0
- package/bin/exceptd.js +30 -20
- package/data/_indexes/_meta.json +26 -23
- package/data/_indexes/activity-feed.json +32 -11
- package/data/_indexes/catalog-summaries.json +3 -3
- package/data/_indexes/chains.json +965 -35
- package/data/_indexes/currency.json +68 -41
- package/data/_indexes/frequency.json +428 -124
- package/data/_indexes/handoff-dag.json +70 -19
- package/data/_indexes/jurisdiction-map.json +37 -12
- package/data/_indexes/section-offsets.json +282 -0
- package/data/_indexes/stale-content.json +3 -3
- package/data/_indexes/summary-cards.json +198 -0
- package/data/_indexes/token-budget.json +168 -3
- package/data/_indexes/trigger-table.json +190 -0
- package/data/_indexes/xref.json +145 -2
- package/data/atlas-ttps.json +61 -111
- package/data/attack-techniques.json +104 -19
- package/data/cve-catalog.json +101 -45
- package/data/cwe-catalog.json +149 -94
- package/data/d3fend-catalog.json +199 -53
- package/data/framework-control-gaps.json +1679 -89
- package/data/playbooks/cloud-iam-incident.json +1351 -0
- package/data/playbooks/crypto-codebase.json +1 -1
- package/data/playbooks/idp-incident.json +1259 -0
- package/data/playbooks/ransomware.json +1407 -0
- package/data/rfc-references.json +58 -59
- package/lib/exit-codes.js +2 -0
- package/lib/playbook-runner.js +25 -1
- package/manifest-snapshot.json +220 -3
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +287 -45
- package/package.json +3 -2
- package/sbom.cdx.json +1854 -11
- package/scripts/backfill-theater-test.js +806 -0
- package/scripts/refresh-reverse-refs.js +171 -0
- package/scripts/refresh-sbom.js +155 -8
- package/skills/cloud-iam-incident/skill.md +419 -0
- package/skills/idp-incident-response/skill.md +352 -0
- package/skills/ransomware-response/skill.md +374 -0
package/data/_indexes/xref.json
CHANGED
|
@@ -45,6 +45,7 @@
|
|
|
45
45
|
"webapp-security"
|
|
46
46
|
],
|
|
47
47
|
"CWE-345": [
|
|
48
|
+
"idp-incident-response",
|
|
48
49
|
"mcp-agent-trust"
|
|
49
50
|
],
|
|
50
51
|
"CWE-352": [
|
|
@@ -96,12 +97,15 @@
|
|
|
96
97
|
],
|
|
97
98
|
"CWE-269": [
|
|
98
99
|
"attack-surface-pentest",
|
|
100
|
+
"cloud-iam-incident",
|
|
99
101
|
"container-runtime-security",
|
|
100
102
|
"identity-assurance",
|
|
103
|
+
"idp-incident-response",
|
|
101
104
|
"webapp-security"
|
|
102
105
|
],
|
|
103
106
|
"CWE-732": [
|
|
104
107
|
"attack-surface-pentest",
|
|
108
|
+
"cloud-iam-incident",
|
|
105
109
|
"cloud-security",
|
|
106
110
|
"container-runtime-security",
|
|
107
111
|
"identity-assurance",
|
|
@@ -149,9 +153,12 @@
|
|
|
149
153
|
"CWE-287": [
|
|
150
154
|
"age-gates-child-safety",
|
|
151
155
|
"api-security",
|
|
156
|
+
"cloud-iam-incident",
|
|
152
157
|
"cloud-security",
|
|
153
158
|
"identity-assurance",
|
|
159
|
+
"idp-incident-response",
|
|
154
160
|
"ot-ics-security",
|
|
161
|
+
"ransomware-response",
|
|
155
162
|
"sector-energy",
|
|
156
163
|
"sector-financial",
|
|
157
164
|
"sector-healthcare",
|
|
@@ -165,9 +172,11 @@
|
|
|
165
172
|
"sector-telecom"
|
|
166
173
|
],
|
|
167
174
|
"CWE-798": [
|
|
175
|
+
"cloud-iam-incident",
|
|
168
176
|
"cloud-security",
|
|
169
177
|
"identity-assurance",
|
|
170
178
|
"ot-ics-security",
|
|
179
|
+
"ransomware-response",
|
|
171
180
|
"sector-energy",
|
|
172
181
|
"sector-financial"
|
|
173
182
|
],
|
|
@@ -182,13 +191,22 @@
|
|
|
182
191
|
],
|
|
183
192
|
"CWE-863": [
|
|
184
193
|
"api-security",
|
|
194
|
+
"cloud-iam-incident",
|
|
185
195
|
"identity-assurance",
|
|
196
|
+
"idp-incident-response",
|
|
186
197
|
"sector-financial",
|
|
187
198
|
"webapp-security"
|
|
188
199
|
],
|
|
189
200
|
"CWE-1037": [
|
|
190
201
|
"ot-ics-security",
|
|
191
202
|
"sector-energy"
|
|
203
|
+
],
|
|
204
|
+
"CWE-522": [
|
|
205
|
+
"cloud-iam-incident",
|
|
206
|
+
"idp-incident-response"
|
|
207
|
+
],
|
|
208
|
+
"CWE-284": [
|
|
209
|
+
"idp-incident-response"
|
|
192
210
|
]
|
|
193
211
|
},
|
|
194
212
|
"d3fend_refs": {
|
|
@@ -217,23 +235,31 @@
|
|
|
217
235
|
"D3-IOPR": [
|
|
218
236
|
"ai-attack-surface",
|
|
219
237
|
"ai-c2-detection",
|
|
238
|
+
"cloud-iam-incident",
|
|
220
239
|
"defensive-countermeasure-mapping",
|
|
221
240
|
"dlp-gap-analysis",
|
|
222
241
|
"fuzz-testing-strategy",
|
|
242
|
+
"idp-incident-response",
|
|
223
243
|
"rag-pipeline-security",
|
|
244
|
+
"ransomware-response",
|
|
224
245
|
"sector-telecom"
|
|
225
246
|
],
|
|
226
247
|
"D3-NTA": [
|
|
227
248
|
"ai-attack-surface",
|
|
228
249
|
"ai-c2-detection",
|
|
229
250
|
"attack-surface-pentest",
|
|
251
|
+
"cloud-iam-incident",
|
|
230
252
|
"defensive-countermeasure-mapping",
|
|
231
253
|
"dlp-gap-analysis",
|
|
254
|
+
"idp-incident-response",
|
|
232
255
|
"rag-pipeline-security",
|
|
256
|
+
"ransomware-response",
|
|
233
257
|
"sector-telecom"
|
|
234
258
|
],
|
|
235
259
|
"D3-CBAN": [
|
|
260
|
+
"cloud-iam-incident",
|
|
236
261
|
"defensive-countermeasure-mapping",
|
|
262
|
+
"idp-incident-response",
|
|
237
263
|
"mcp-agent-trust",
|
|
238
264
|
"supply-chain-integrity"
|
|
239
265
|
],
|
|
@@ -243,7 +269,8 @@
|
|
|
243
269
|
"defensive-countermeasure-mapping",
|
|
244
270
|
"dlp-gap-analysis",
|
|
245
271
|
"mcp-agent-trust",
|
|
246
|
-
"rag-pipeline-security"
|
|
272
|
+
"rag-pipeline-security",
|
|
273
|
+
"ransomware-response"
|
|
247
274
|
],
|
|
248
275
|
"D3-EHB": [
|
|
249
276
|
"defensive-countermeasure-mapping",
|
|
@@ -251,7 +278,9 @@
|
|
|
251
278
|
"supply-chain-integrity"
|
|
252
279
|
],
|
|
253
280
|
"D3-MFA": [
|
|
281
|
+
"cloud-iam-incident",
|
|
254
282
|
"defensive-countermeasure-mapping",
|
|
283
|
+
"idp-incident-response",
|
|
255
284
|
"mcp-agent-trust"
|
|
256
285
|
],
|
|
257
286
|
"D3-CA": [
|
|
@@ -288,10 +317,14 @@
|
|
|
288
317
|
"defensive-countermeasure-mapping"
|
|
289
318
|
],
|
|
290
319
|
"D3-RPA": [
|
|
291
|
-
"defensive-countermeasure-mapping"
|
|
320
|
+
"defensive-countermeasure-mapping",
|
|
321
|
+
"ransomware-response"
|
|
292
322
|
],
|
|
293
323
|
"D3-SCP": [
|
|
294
324
|
"defensive-countermeasure-mapping"
|
|
325
|
+
],
|
|
326
|
+
"D3-CAA": [
|
|
327
|
+
"cloud-iam-incident"
|
|
295
328
|
]
|
|
296
329
|
},
|
|
297
330
|
"framework_gaps": {
|
|
@@ -545,6 +578,72 @@
|
|
|
545
578
|
],
|
|
546
579
|
"ITU-T-X.805": [
|
|
547
580
|
"sector-telecom"
|
|
581
|
+
],
|
|
582
|
+
"OFAC-SDN-Payment-Block": [
|
|
583
|
+
"ransomware-response"
|
|
584
|
+
],
|
|
585
|
+
"Insurance-Carrier-24h-Notification": [
|
|
586
|
+
"ransomware-response"
|
|
587
|
+
],
|
|
588
|
+
"EU-Sanctions-Reg-2014-833-Cyber": [
|
|
589
|
+
"ransomware-response"
|
|
590
|
+
],
|
|
591
|
+
"Immutable-Backup-Recovery": [
|
|
592
|
+
"ransomware-response"
|
|
593
|
+
],
|
|
594
|
+
"Decryptor-Availability-Pre-Decision": [
|
|
595
|
+
"ransomware-response"
|
|
596
|
+
],
|
|
597
|
+
"PHI-Exfil-Before-Encrypt-Breach-Class": [
|
|
598
|
+
"ransomware-response"
|
|
599
|
+
],
|
|
600
|
+
"FedRAMP-IL5-IAM-Federated": [
|
|
601
|
+
"cloud-iam-incident"
|
|
602
|
+
],
|
|
603
|
+
"CISA-Snowflake-AA24-IdP-Cloud": [
|
|
604
|
+
"cloud-iam-incident"
|
|
605
|
+
],
|
|
606
|
+
"NIST-800-53-AC-2-Cross-Account": [
|
|
607
|
+
"cloud-iam-incident"
|
|
608
|
+
],
|
|
609
|
+
"ISO-27017-Cloud-IAM": [
|
|
610
|
+
"cloud-iam-incident"
|
|
611
|
+
],
|
|
612
|
+
"SOC2-CC6-Access-Key-Leak-Public-Repo": [
|
|
613
|
+
"cloud-iam-incident"
|
|
614
|
+
],
|
|
615
|
+
"AWS-Security-Hub-Coverage-Gap": [
|
|
616
|
+
"cloud-iam-incident"
|
|
617
|
+
],
|
|
618
|
+
"UK-CAF-B2-Cloud-IAM": [
|
|
619
|
+
"cloud-iam-incident"
|
|
620
|
+
],
|
|
621
|
+
"AU-ISM-1546-Cloud-Service-Account": [
|
|
622
|
+
"cloud-iam-incident"
|
|
623
|
+
],
|
|
624
|
+
"NIST-800-53-IA-5-Federated": [
|
|
625
|
+
"idp-incident-response"
|
|
626
|
+
],
|
|
627
|
+
"ISO-27001-2022-A.5.16-Federated": [
|
|
628
|
+
"idp-incident-response"
|
|
629
|
+
],
|
|
630
|
+
"SOC2-CC6-OAuth-Consent": [
|
|
631
|
+
"idp-incident-response"
|
|
632
|
+
],
|
|
633
|
+
"UK-CAF-B2-IdP-Tenant": [
|
|
634
|
+
"idp-incident-response"
|
|
635
|
+
],
|
|
636
|
+
"AU-ISM-1559-IdP": [
|
|
637
|
+
"idp-incident-response"
|
|
638
|
+
],
|
|
639
|
+
"NIS2-Art-21-Federated-Identity": [
|
|
640
|
+
"idp-incident-response"
|
|
641
|
+
],
|
|
642
|
+
"DORA-Art-19-IdP-4h": [
|
|
643
|
+
"idp-incident-response"
|
|
644
|
+
],
|
|
645
|
+
"OFAC-Sanctions-Threat-Actor-Negotiation": [
|
|
646
|
+
"idp-incident-response"
|
|
548
647
|
]
|
|
549
648
|
},
|
|
550
649
|
"atlas_refs": {
|
|
@@ -559,6 +658,7 @@
|
|
|
559
658
|
"ai-attack-surface",
|
|
560
659
|
"ai-risk-management",
|
|
561
660
|
"attack-surface-pentest",
|
|
661
|
+
"cloud-iam-incident",
|
|
562
662
|
"dlp-gap-analysis",
|
|
563
663
|
"identity-assurance",
|
|
564
664
|
"incident-response-playbook",
|
|
@@ -636,6 +736,7 @@
|
|
|
636
736
|
"ai-attack-surface",
|
|
637
737
|
"attack-surface-pentest",
|
|
638
738
|
"mcp-agent-trust",
|
|
739
|
+
"ransomware-response",
|
|
639
740
|
"webapp-security"
|
|
640
741
|
],
|
|
641
742
|
"T1190": [
|
|
@@ -680,10 +781,12 @@
|
|
|
680
781
|
"age-gates-child-safety",
|
|
681
782
|
"api-security",
|
|
682
783
|
"attack-surface-pentest",
|
|
784
|
+
"cloud-iam-incident",
|
|
683
785
|
"cloud-security",
|
|
684
786
|
"email-security-anti-phishing",
|
|
685
787
|
"identity-assurance",
|
|
686
788
|
"incident-response-playbook",
|
|
789
|
+
"ransomware-response",
|
|
687
790
|
"sector-energy",
|
|
688
791
|
"sector-financial",
|
|
689
792
|
"sector-healthcare",
|
|
@@ -694,6 +797,7 @@
|
|
|
694
797
|
"api-security",
|
|
695
798
|
"dlp-gap-analysis",
|
|
696
799
|
"incident-response-playbook",
|
|
800
|
+
"ransomware-response",
|
|
697
801
|
"sector-financial",
|
|
698
802
|
"sector-healthcare"
|
|
699
803
|
],
|
|
@@ -736,12 +840,14 @@
|
|
|
736
840
|
],
|
|
737
841
|
"T1486": [
|
|
738
842
|
"incident-response-playbook",
|
|
843
|
+
"ransomware-response",
|
|
739
844
|
"sector-financial"
|
|
740
845
|
],
|
|
741
846
|
"T1098": [
|
|
742
847
|
"sector-telecom"
|
|
743
848
|
],
|
|
744
849
|
"T1199": [
|
|
850
|
+
"idp-incident-response",
|
|
745
851
|
"sector-telecom"
|
|
746
852
|
],
|
|
747
853
|
"T1552": [
|
|
@@ -761,6 +867,29 @@
|
|
|
761
867
|
],
|
|
762
868
|
"T1566.003": [
|
|
763
869
|
"email-security-anti-phishing"
|
|
870
|
+
],
|
|
871
|
+
"T1078.004": [
|
|
872
|
+
"cloud-iam-incident",
|
|
873
|
+
"idp-incident-response"
|
|
874
|
+
],
|
|
875
|
+
"T1098.001": [
|
|
876
|
+
"cloud-iam-incident",
|
|
877
|
+
"idp-incident-response"
|
|
878
|
+
],
|
|
879
|
+
"T1552.005": [
|
|
880
|
+
"cloud-iam-incident"
|
|
881
|
+
],
|
|
882
|
+
"T1580": [
|
|
883
|
+
"cloud-iam-incident"
|
|
884
|
+
],
|
|
885
|
+
"T1538": [
|
|
886
|
+
"cloud-iam-incident"
|
|
887
|
+
],
|
|
888
|
+
"T1556.007": [
|
|
889
|
+
"idp-incident-response"
|
|
890
|
+
],
|
|
891
|
+
"T1606.002": [
|
|
892
|
+
"idp-incident-response"
|
|
764
893
|
]
|
|
765
894
|
},
|
|
766
895
|
"rfc_refs": {
|
|
@@ -780,8 +909,10 @@
|
|
|
780
909
|
],
|
|
781
910
|
"RFC-7519": [
|
|
782
911
|
"api-security",
|
|
912
|
+
"cloud-iam-incident",
|
|
783
913
|
"cloud-security",
|
|
784
914
|
"identity-assurance",
|
|
915
|
+
"idp-incident-response",
|
|
785
916
|
"mcp-agent-trust",
|
|
786
917
|
"sector-financial",
|
|
787
918
|
"sector-healthcare",
|
|
@@ -801,8 +932,10 @@
|
|
|
801
932
|
],
|
|
802
933
|
"RFC-8725": [
|
|
803
934
|
"api-security",
|
|
935
|
+
"cloud-iam-incident",
|
|
804
936
|
"cloud-security",
|
|
805
937
|
"identity-assurance",
|
|
938
|
+
"idp-incident-response",
|
|
806
939
|
"mcp-agent-trust",
|
|
807
940
|
"sector-financial",
|
|
808
941
|
"webapp-security"
|
|
@@ -816,6 +949,7 @@
|
|
|
816
949
|
"RFC-9421": [
|
|
817
950
|
"ai-c2-detection",
|
|
818
951
|
"api-security",
|
|
952
|
+
"idp-incident-response",
|
|
819
953
|
"mcp-agent-trust",
|
|
820
954
|
"sector-financial",
|
|
821
955
|
"sector-healthcare"
|
|
@@ -862,6 +996,15 @@
|
|
|
862
996
|
],
|
|
863
997
|
"RFC-9622": [
|
|
864
998
|
"sector-telecom"
|
|
999
|
+
],
|
|
1000
|
+
"RFC-8693": [
|
|
1001
|
+
"cloud-iam-incident"
|
|
1002
|
+
],
|
|
1003
|
+
"RFC-9068": [
|
|
1004
|
+
"cloud-iam-incident"
|
|
1005
|
+
],
|
|
1006
|
+
"RFC-7591": [
|
|
1007
|
+
"idp-incident-response"
|
|
865
1008
|
]
|
|
866
1009
|
},
|
|
867
1010
|
"dlp_refs": {}
|