@blamejs/exceptd-skills 0.12.39 → 0.12.41

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -63,9 +63,7 @@
63
63
  "real_requirement": "MCP trust controls: signed server manifests, explicit tool allowlists, bearer authentication, sandboxed server processes, organizational approved-registry for MCP servers.",
64
64
  "status": "open",
65
65
  "opened_date": "2026-04-01",
66
- "evidence_cves": [
67
- "CVE-2026-30615"
68
- ],
66
+ "evidence_cves": [],
69
67
  "atlas_refs": [
70
68
  "AML.T0010"
71
69
  ],
@@ -96,9 +94,7 @@
96
94
  "real_requirement": "Prompt-level access control: each model invocation is constrained to an authorized action scope. Actions outside that scope require explicit user re-authorization. System prompt establishes authority hierarchy.",
97
95
  "status": "open",
98
96
  "opened_date": "2026-01-01",
99
- "evidence_cves": [
100
- "CVE-2025-53773"
101
- ],
97
+ "evidence_cves": [],
102
98
  "atlas_refs": [
103
99
  "AML.T0051",
104
100
  "AML.T0054"
@@ -130,17 +126,13 @@
130
126
  "real_requirement": "User-application hardening enumerates AI assistants and MCP servers in scope; sets default-deny on tool grants with explicit per-tool acknowledgement; pins MCP server versions with signature verification; treats AI-tool config files (.claude/settings.json, .cursor/mcp.json, .vscode/settings.json's chat.tools.autoApprove) as integrity-monitored configuration with the same protection profile as security-sensitive files.",
131
127
  "status": "open",
132
128
  "opened_date": "2026-05-13",
133
- "evidence_cves": [
134
- "CVE-2025-53773",
135
- "CVE-2026-30615"
136
- ],
129
+ "evidence_cves": [],
137
130
  "atlas_refs": [
138
131
  "AML.T0010",
139
132
  "AML.T0051"
140
133
  ],
141
134
  "attack_refs": [
142
- "T1059",
143
- "T1204"
135
+ "T1059"
144
136
  ],
145
137
  "theater_test": {
146
138
  "claim": "We hardened user applications per Essential Eight Maturity Level 2; browsers and Office are locked down.",
@@ -166,9 +158,7 @@
166
158
  "real_requirement": "Backups cover AI-system artefacts (model weights, RAG corpora, plugin registries, AI-tool configuration files) with off-network retention; backup-integrity verification includes per-document hash comparison for RAG corpora to detect corpus poisoning; documented 'AI-system restore to last-known-good' workflow that maps to detected AI-incident classes.",
167
159
  "status": "open",
168
160
  "opened_date": "2026-05-13",
169
- "evidence_cves": [
170
- "CVE-2026-45321"
171
- ],
161
+ "evidence_cves": [],
172
162
  "atlas_refs": [
173
163
  "AML.T0010",
174
164
  "AML.T0020",
@@ -231,11 +221,7 @@
231
221
  "real_requirement": "Patch operating systems with KEV-anchored SLA (≤48h for critical with public PoC, live-patching mandatory on hosts that can't accept a reboot within window); kernel patching pipeline distinct from userspace patch pipeline; third-party kernel module patches tracked alongside vendor patches; SLA metric is 'time from KEV listing to deployed', not 'time from advisory publication'.",
232
222
  "status": "open",
233
223
  "opened_date": "2026-05-13",
234
- "evidence_cves": [
235
- "CVE-2026-31431",
236
- "CVE-2026-43284",
237
- "CVE-2026-43500"
238
- ],
224
+ "evidence_cves": [],
239
225
  "atlas_refs": [],
240
226
  "attack_refs": [
241
227
  "T1068"
@@ -298,10 +284,7 @@
298
284
  "real_requirement": "CMMC 2.0 Level 2 must require: (1) inventory of AI assistants and MCP servers with CUI-adjacent access (3.4.1 extension), (2) AI-API egress monitoring as a CUI protection control (3.13 extension), (3) prompt-injection RCE in developer tooling as a 3.14 threat class with patching SLA, (4) explicit cross-walk to UK DEF STAN 05-138 and AU DISP for joint-programme AI policy parity.",
299
285
  "status": "open",
300
286
  "opened_date": "2026-05-11",
301
- "evidence_cves": [
302
- "CVE-2025-53773",
303
- "CVE-2026-30615"
304
- ],
287
+ "evidence_cves": [],
305
288
  "atlas_refs": [
306
289
  "AML.T0010",
307
290
  "AML.T0051",
@@ -337,9 +320,7 @@
337
320
  "real_requirement": "Programmes that claim 'Top 25 addressed' as compliance evidence must additionally: (1) enumerate AI-relevant CWEs outside the Top 25 (CWE-1426 Improper Output Validation, CWE-1039 Inadequate Detection of Adversarial Input, CWE-1230 Exposure of Sensitive Info Through Metadata) with explicit treatment, (2) cross-walk to ATLAS v5.1.0 TTPs for adversarial coverage, (3) re-baseline against the next-published Top 25 with delta analysis. Aligns with EU CRA Annex I, UK NCSC, AU ISM, ISO 27001 A.8.28.",
338
321
  "status": "open",
339
322
  "opened_date": "2026-05-11",
340
- "evidence_cves": [
341
- "CVE-2025-53773"
342
- ],
323
+ "evidence_cves": [],
343
324
  "atlas_refs": [
344
325
  "AML.T0043",
345
326
  "AML.T0051",
@@ -373,9 +354,7 @@
373
354
  "real_requirement": "CycloneDX 1.6 deployment must require: (1) ML-BOM completeness checks (model + adapters + tokenizer + training data manifest where licensable), (2) MCP server inventory as part of the application SBOM, (3) populated provenance fields (signature, training data source, supplier) — empty fields treated as a defect, (4) SPDX 3.0 AI cross-walk evidence to satisfy EU CRA Annex I parity.",
374
355
  "status": "open",
375
356
  "opened_date": "2026-05-11",
376
- "evidence_cves": [
377
- "CVE-2026-30615"
378
- ],
357
+ "evidence_cves": [],
379
358
  "atlas_refs": [
380
359
  "AML.T0010",
381
360
  "AML.T0018",
@@ -443,9 +422,7 @@
443
422
  "real_requirement": "RTS subcontracting register must add: (1) AI sub-processor enumeration (model provider, embedding provider, vector store, RAG corpus host) per ICT service line, (2) MCP server inventory treated as a subcontractor class, (3) foundation-model concentration analysis alongside cloud-provider concentration, (4) per-call inference-routing residency for AI services, (5) explicit cross-walk to UK PRA SS2/21 + AU CPS 230 for cross-border AI sub-processor disclosure.",
444
423
  "status": "open",
445
424
  "opened_date": "2026-05-15",
446
- "evidence_cves": [
447
- "CVE-2026-30615"
448
- ],
425
+ "evidence_cves": [],
449
426
  "atlas_refs": [
450
427
  "AML.T0010"
451
428
  ],
@@ -478,10 +455,7 @@
478
455
  "real_requirement": "ITS-TLPT must add: (1) AI/MCP asset enumeration in the scoping template, (2) AI-augmented threat intelligence inputs (ATLAS TTPs, AI-discovered CVE classes), (3) standard authorisation clauses for adversarial testing against third-party AI providers, (4) AI/MCP competency requirements for TLPT-tester certifications, (5) cross-walk to TIBER-EU + UK CBEST + AU CORIE updated scope language.",
479
456
  "status": "open",
480
457
  "opened_date": "2026-05-15",
481
- "evidence_cves": [
482
- "CVE-2025-53773",
483
- "CVE-2026-30615"
484
- ],
458
+ "evidence_cves": [],
485
459
  "atlas_refs": [
486
460
  "AML.T0010",
487
461
  "AML.T0051",
@@ -516,9 +490,7 @@
516
490
  "real_requirement": "RTS classification must add: (1) AI-incident class enumeration in the qualitative criteria, (2) AI-specific quantitative measures (model invocations affected, agent actions taken on injected intent, RAG corpus integrity loss), (3) ATLAS-class adversary indicators as significant-cyber-threat triggers, (4) cross-walk to NIS2 Art. 23 + UK FCA SUP 15.3 + AU CPS 234 with AI-class fields.",
517
491
  "status": "open",
518
492
  "opened_date": "2026-05-15",
519
- "evidence_cves": [
520
- "CVE-2025-53773"
521
- ],
493
+ "evidence_cves": [],
522
494
  "atlas_refs": [
523
495
  "AML.T0051",
524
496
  "AML.T0054",
@@ -586,9 +558,8 @@
586
558
  "status": "open",
587
559
  "opened_date": "2026-05-13",
588
560
  "evidence_cves": [
589
- "CVE-2025-53773",
590
- "CVE-2026-30615",
591
- "CVE-2026-39987"
561
+ "CVE-2026-39987",
562
+ "CVE-2026-42208"
592
563
  ],
593
564
  "atlas_refs": [
594
565
  "AML.T0010",
@@ -654,10 +625,7 @@
654
625
  "real_requirement": "Art. 55 operationalisation must add: (1) prescribed adversarial-evaluation methodology covering OWASP LLM Top 10 + ATLAS TTPs + MCP-trust scenarios, (2) standardised energy reporting (kWh per million tokens, training compute under ISO/IEC TR 24028), (3) reconciled incident-reporting clocks with DORA Art. 19 + NIS2 Art. 23, (4) explicit control catalogue for model-layer cybersecurity (weights provenance, system-prompt integrity, fine-tune access control).",
655
626
  "status": "open",
656
627
  "opened_date": "2026-05-15",
657
- "evidence_cves": [
658
- "CVE-2025-53773",
659
- "CVE-2026-30615"
660
- ],
628
+ "evidence_cves": [],
661
629
  "atlas_refs": [
662
630
  "AML.T0010",
663
631
  "AML.T0018",
@@ -756,9 +724,10 @@
756
724
  "status": "open",
757
725
  "opened_date": "2026-05-13",
758
726
  "evidence_cves": [
727
+ "CVE-2026-42897",
728
+ "CVE-2026-45321",
759
729
  "MAL-2026-3083",
760
- "CVE-2025-53773",
761
- "CVE-2026-42897"
730
+ "MAL-2026-NODE-IPC-STEALER"
762
731
  ],
763
732
  "atlas_refs": [
764
733
  "AML.T0010",
@@ -793,10 +762,7 @@
793
762
  "real_requirement": "FedRAMP Rev 5 Moderate must publish: (1) an AI provider attestation path (StateRAMP-equivalent or FedRAMP Tailored for AI services), (2) explicit shared-responsibility matrix for AI APIs covering prompt data, output data, training opt-out, and retention, (3) SSP template language for documenting AI API usage in authorised systems, (4) cross-walk to EU EUCS Substantial and AU IRAP PROTECTED for joint operations.",
794
763
  "status": "open",
795
764
  "opened_date": "2026-05-11",
796
- "evidence_cves": [
797
- "CVE-2025-53773",
798
- "CVE-2026-30615"
799
- ],
765
+ "evidence_cves": [],
800
766
  "atlas_refs": [
801
767
  "AML.T0051",
802
768
  "AML.T0096"
@@ -830,9 +796,7 @@
830
796
  "real_requirement": "164.312(a)(1) implementation must add: (1) BAA-level coverage for AI providers including prompt retention, training opt-out, and breach notification within HIPAA timelines, (2) per-prompt PHI minimisation (DLP), (3) AI agent session controls treated separately from human user controls, (4) cross-walk with GDPR Art. 35 / UK NHS DSPT / AU APP 11 for cross-border health data in AI workflows.",
831
797
  "status": "open",
832
798
  "opened_date": "2026-05-11",
833
- "evidence_cves": [
834
- "CVE-2025-53773"
835
- ],
799
+ "evidence_cves": [],
836
800
  "atlas_refs": [
837
801
  "AML.T0054",
838
802
  "AML.T0096"
@@ -866,9 +830,7 @@
866
830
  "real_requirement": "164.308 NPRM implementation must add: (1) AI assistants + model-API providers as enumerated technology-asset categories, (2) network-map requirement extended to AI-API egress including BAA / training-opt-out attestation per route, (3) tabletop-exercise catalogue covering AI-specific PHI loss scenarios, (4) workforce training module specific to AI handling of PHI. Note: final rule still pending — track HHS-OCR publication date Q3 2026.",
867
831
  "status": "open",
868
832
  "opened_date": "2026-05-15",
869
- "evidence_cves": [
870
- "CVE-2025-53773"
871
- ],
833
+ "evidence_cves": [],
872
834
  "atlas_refs": [
873
835
  "AML.T0054",
874
836
  "AML.T0096"
@@ -902,9 +864,7 @@
902
864
  "real_requirement": "164.310 NPRM implementation must add: (1) AI-API session logging treated as in-scope under the network-access-logging mandate, (2) developer-endpoint workstation security extended to AI assistants with PHI exposure, (3) media-disposal verification extended to AI training-data opt-out attestation, (4) MCP-server enumeration in the deployed-asset inventory. Final rule pending.",
903
865
  "status": "open",
904
866
  "opened_date": "2026-05-15",
905
- "evidence_cves": [
906
- "CVE-2026-30615"
907
- ],
867
+ "evidence_cves": [],
908
868
  "atlas_refs": [
909
869
  "AML.T0010",
910
870
  "AML.T0054"
@@ -937,11 +897,7 @@
937
897
  "real_requirement": "164.312 NPRM implementation must add: (1) per-action MFA-equivalent for AI-agent PHI access (delegated-authority attestation), (2) encryption-at-rest extended to AI-provider artifacts (conversation history, embeddings, fine-tune sets), (3) prompt-injection + RAG-poisoning detection as anti-malware-equivalent for AI-augmented systems, (4) CISA-KEV-class patch tier (< 72h) layered over the 6-month scan cadence. Final rule pending.",
938
898
  "status": "open",
939
899
  "opened_date": "2026-05-15",
940
- "evidence_cves": [
941
- "CVE-2025-53773",
942
- "CVE-2026-30615",
943
- "CVE-2026-31431"
944
- ],
900
+ "evidence_cves": [],
945
901
  "atlas_refs": [
946
902
  "AML.T0010",
947
903
  "AML.T0051",
@@ -977,9 +933,7 @@
977
933
  "real_requirement": "164.314 NPRM implementation must add: (1) AI-sub-processor explicit flow-down template, (2) AI-specific BAA clauses (prompt retention, training opt-out, model version pinning, AI-incident reporting timeline), (3) AI-handling training requirement for business-associate workforce, (4) accelerated notification clock for AI-mediated PHI loss class. Final rule pending.",
978
934
  "status": "open",
979
935
  "opened_date": "2026-05-15",
980
- "evidence_cves": [
981
- "CVE-2025-53773"
982
- ],
936
+ "evidence_cves": [],
983
937
  "atlas_refs": [
984
938
  "AML.T0010",
985
939
  "AML.T0054"
@@ -1012,10 +966,7 @@
1012
966
  "real_requirement": "09.l must require: (1) AI vendor inventory separate from general SaaS inventory, (2) AI-specific contractual clauses (prompt retention, training opt-out, residency, version pinning, prompt-breach notification timeline), (3) self-signup AI usage prohibited for in-scope data, (4) cross-walk to EU AI Act Art. 25, UK ICO AI guidance, AU Privacy Act third-party obligations.",
1013
967
  "status": "open",
1014
968
  "opened_date": "2026-05-11",
1015
- "evidence_cves": [
1016
- "CVE-2025-53773",
1017
- "CVE-2026-30615"
1018
- ],
969
+ "evidence_cves": [],
1019
970
  "atlas_refs": [
1020
971
  "AML.T0010",
1021
972
  "AML.T0054"
@@ -1048,9 +999,7 @@
1048
999
  "real_requirement": "62443-3-3 must add AI-in-OT requirements: SL2+ environments must prohibit or strictly gate LLM HMI overlays; FR1 must distinguish 'human operator action' from 'AI-mediated action initiated by operator' as separate identity claims; conduits-and-zones diagrams must enumerate AI-API egress as a named conduit subject to FR5 (Restricted Data Flow) and monitored under FR6.",
1049
1000
  "status": "open",
1050
1001
  "opened_date": "2026-05-11",
1051
- "evidence_cves": [
1052
- "CVE-2025-53773"
1053
- ],
1002
+ "evidence_cves": [],
1054
1003
  "atlas_refs": [
1055
1004
  "AML.T0051",
1056
1005
  "AML.T0054",
@@ -1118,9 +1067,7 @@
1118
1067
  "real_requirement": "Separate AI system security controls are needed: prompt injection testing, model integrity verification, training pipeline security, RAG pipeline security. A.8.28 is not the right control family for AI system security.",
1119
1068
  "status": "open",
1120
1069
  "opened_date": "2026-01-01",
1121
- "evidence_cves": [
1122
- "CVE-2025-53773"
1123
- ],
1070
+ "evidence_cves": [],
1124
1071
  "atlas_refs": [
1125
1072
  "AML.T0051",
1126
1073
  "AML.T0054"
@@ -1186,8 +1133,9 @@
1186
1133
  "status": "open",
1187
1134
  "opened_date": "2026-03-15",
1188
1135
  "evidence_cves": [
1136
+ "CVE-2026-0300",
1189
1137
  "CVE-2026-31431",
1190
- "CVE-2026-0300"
1138
+ "CVE-2026-46300"
1191
1139
  ],
1192
1140
  "atlas_refs": [],
1193
1141
  "attack_refs": [
@@ -1218,9 +1166,7 @@
1218
1166
  "real_requirement": "Clause 7 implementations must add a runtime adversarial-evaluation control: standing red-team prompt suite, success-rate baseline, alerting on regression after model/system-prompt change, evidence retention for incident reconstruction. Drift monitoring must include adversarial robustness, not only statistical accuracy.",
1219
1167
  "status": "open",
1220
1168
  "opened_date": "2026-05-11",
1221
- "evidence_cves": [
1222
- "CVE-2025-53773"
1223
- ],
1169
+ "evidence_cves": [],
1224
1170
  "atlas_refs": [
1225
1171
  "AML.T0043",
1226
1172
  "AML.T0051",
@@ -1254,10 +1200,7 @@
1254
1200
  "real_requirement": "Clause 6.1.2 risk registers must (1) ingest ATLAS v5.1.0 TTPs as enumerated AI-specific threat sources, (2) cross-reference jurisdictional obligations (EU AI Act Annex III, NIS2 Art. 21, DORA Art. 28, UK CAF B4, AU ISM AI annex, ISO 27001:2022 A.5.7), (3) include AI-API-as-C2 and prompt-injection-as-RCE as named scenarios, (4) be re-run on threat-intel triggers, not only on calendar cycles.",
1255
1201
  "status": "open",
1256
1202
  "opened_date": "2026-05-11",
1257
- "evidence_cves": [
1258
- "CVE-2025-53773",
1259
- "CVE-2026-30615"
1260
- ],
1203
+ "evidence_cves": [],
1261
1204
  "atlas_refs": [
1262
1205
  "AML.T0051",
1263
1206
  "AML.T0054",
@@ -1292,9 +1235,7 @@
1292
1235
  "real_requirement": "CIP-007-6 R4 must enumerate: (1) AI operator assistants as monitored event sources with explicit alerting on assistant-initiated operator commands, (2) AI-API egress events at the corporate-to-OT boundary, (3) prompt-injection indicators as a distinct event class, (4) alignment of R4 monitoring outputs with NIS2 24h/72h reporting obligations for multinational operators.",
1293
1236
  "status": "open",
1294
1237
  "opened_date": "2026-05-11",
1295
- "evidence_cves": [
1296
- "CVE-2025-53773"
1297
- ],
1238
+ "evidence_cves": [],
1298
1239
  "atlas_refs": [
1299
1240
  "AML.T0051",
1300
1241
  "AML.T0054",
@@ -1331,10 +1272,8 @@
1331
1272
  "status": "open",
1332
1273
  "opened_date": "2026-05-13",
1333
1274
  "evidence_cves": [
1334
- "CVE-2025-53773",
1335
- "CVE-2026-30615",
1336
- "CVE-2026-45321",
1337
1275
  "CVE-2026-39987",
1276
+ "CVE-2026-42208",
1338
1277
  "CVE-2026-42897"
1339
1278
  ],
1340
1279
  "atlas_refs": [
@@ -1371,7 +1310,11 @@
1371
1310
  "status": "open",
1372
1311
  "opened_date": "2026-03-15",
1373
1312
  "evidence_cves": [
1374
- "CVE-2026-31431"
1313
+ "CVE-2026-31431",
1314
+ "CVE-2026-39884",
1315
+ "CVE-2026-45321",
1316
+ "CVE-2026-46300",
1317
+ "MAL-2026-3083"
1375
1318
  ],
1376
1319
  "atlas_refs": [],
1377
1320
  "attack_refs": [
@@ -1402,10 +1345,7 @@
1402
1345
  "real_requirement": "800-115 must add: (1) AI-API testing chapter with techniques for prompt injection, jailbreak, model-DoS, embedding inversion, AI-API-as-C2, (2) prompt-fuzzing methodology with evidence retention guidance, (3) MCP server test class, (4) explicit compliance cross-walk: under what regimes (PCI 11.4, DORA Art. 24, EU AI Act Art. 15, UK CHECK, AU IRAP) is which test class required.",
1403
1346
  "status": "open",
1404
1347
  "opened_date": "2026-05-11",
1405
- "evidence_cves": [
1406
- "CVE-2025-53773",
1407
- "CVE-2026-30615"
1408
- ],
1348
+ "evidence_cves": [],
1409
1349
  "atlas_refs": [
1410
1350
  "AML.T0010",
1411
1351
  "AML.T0043",
@@ -1444,8 +1384,9 @@
1444
1384
  "status": "open",
1445
1385
  "opened_date": "2026-05-11",
1446
1386
  "evidence_cves": [
1447
- "CVE-2025-53773",
1448
- "CVE-2026-30615"
1387
+ "CVE-2026-45321",
1388
+ "MAL-2026-3083",
1389
+ "MAL-2026-NODE-IPC-STEALER"
1449
1390
  ],
1450
1391
  "atlas_refs": [
1451
1392
  "AML.T0010",
@@ -1516,6 +1457,7 @@
1516
1457
  "status": "open",
1517
1458
  "opened_date": "2026-04-01",
1518
1459
  "evidence_cves": [
1460
+ "CVE-2025-53773",
1519
1461
  "CVE-2026-30615"
1520
1462
  ],
1521
1463
  "atlas_refs": [
@@ -1550,7 +1492,9 @@
1550
1492
  "status": "open",
1551
1493
  "opened_date": "2026-04-01",
1552
1494
  "evidence_cves": [
1553
- "CVE-2026-30615"
1495
+ "CVE-2026-30615",
1496
+ "CVE-2026-45321",
1497
+ "MAL-2026-3083"
1554
1498
  ],
1555
1499
  "atlas_refs": [
1556
1500
  "AML.T0010"
@@ -1583,8 +1527,7 @@
1583
1527
  "status": "open",
1584
1528
  "opened_date": "2026-04-01",
1585
1529
  "evidence_cves": [
1586
- "CVE-2026-43284",
1587
- "CVE-2026-43500"
1530
+ "CVE-2026-43284"
1588
1531
  ],
1589
1532
  "atlas_refs": [],
1590
1533
  "attack_refs": [
@@ -1615,7 +1558,9 @@
1615
1558
  "real_requirement": "SC-7 implementations that operate in environments using AI APIs MUST add an AI-egress-layer control: SDK-level prompt logging with identity binding, anomaly detection on prompt-shape / token-volume / off-business-hours patterns, and an allowlist of AI provider domains that explicitly enumerates the sanctioned business reason for each. Boundary-only SC-7 evidence is incomplete for any org with AI API access in production.",
1616
1559
  "status": "open",
1617
1560
  "opened_date": "2026-05-01",
1618
- "evidence_cves": [],
1561
+ "evidence_cves": [
1562
+ "CVE-2026-42897"
1563
+ ],
1619
1564
  "atlas_refs": [
1620
1565
  "AML.T0096",
1621
1566
  "AML.T0017"
@@ -1649,8 +1594,7 @@
1649
1594
  "status": "open",
1650
1595
  "opened_date": "2026-04-01",
1651
1596
  "evidence_cves": [
1652
- "CVE-2026-43284",
1653
- "CVE-2026-43500"
1597
+ "CVE-2026-43284"
1654
1598
  ],
1655
1599
  "atlas_refs": [],
1656
1600
  "attack_refs": [
@@ -1682,8 +1626,8 @@
1682
1626
  "status": "open",
1683
1627
  "opened_date": "2026-05-13",
1684
1628
  "evidence_cves": [
1685
- "CVE-2026-42208",
1686
- "CVE-2026-39884"
1629
+ "CVE-2026-39884",
1630
+ "CVE-2026-42208"
1687
1631
  ],
1688
1632
  "atlas_refs": [
1689
1633
  "AML.T0053"
@@ -1717,9 +1661,7 @@
1717
1661
  "real_requirement": "SI-12 must be extended to include AI system data: prompt logs (security-relevant AI actions must be retained for incident investigation), model version history, inference output logs for security-sensitive decisions, training data provenance records.",
1718
1662
  "status": "open",
1719
1663
  "opened_date": "2026-03-01",
1720
- "evidence_cves": [
1721
- "CVE-2025-53773"
1722
- ],
1664
+ "evidence_cves": [],
1723
1665
  "atlas_refs": [
1724
1666
  "AML.T0054"
1725
1667
  ],
@@ -1752,13 +1694,15 @@
1752
1694
  "status": "open",
1753
1695
  "opened_date": "2026-03-15",
1754
1696
  "evidence_cves": [
1755
- "CVE-2026-31431",
1756
- "CVE-2026-43284",
1757
1697
  "CVE-2026-0300",
1758
- "CVE-2026-6973",
1759
- "CVE-2026-42897",
1698
+ "CVE-2026-31431",
1760
1699
  "CVE-2026-32202",
1761
- "CVE-2026-33825"
1700
+ "CVE-2026-33825",
1701
+ "CVE-2026-42897",
1702
+ "CVE-2026-43284",
1703
+ "CVE-2026-43500",
1704
+ "CVE-2026-46300",
1705
+ "CVE-2026-6973"
1762
1706
  ],
1763
1707
  "atlas_refs": [],
1764
1708
  "attack_refs": [
@@ -1823,9 +1767,7 @@
1823
1767
  "real_requirement": "800-63B Rev 4 must add an AAL-A (agent assurance level) construct: per-invocation authenticator binding, capability-scoped tokens (what this agent is permitted to do this run), agent-to-agent delegation chains with non-repudiation, and explicit cross-walk to eIDAS 2.0 attestations, UK GPG 45, AU TDIF, and ISO 29115 for cross-border agent identity.",
1824
1768
  "status": "open",
1825
1769
  "opened_date": "2026-05-11",
1826
- "evidence_cves": [
1827
- "CVE-2025-53773"
1828
- ],
1770
+ "evidence_cves": [],
1829
1771
  "atlas_refs": [
1830
1772
  "AML.T0051",
1831
1773
  "AML.T0054"
@@ -1859,9 +1801,7 @@
1859
1801
  "real_requirement": "800-82r3 must add an AI-in-OT control class: (1) explicit prohibition or strict gating of LLM operator assistants in safety-critical zones, (2) prompt-injection threat-model entries for any natural-language operator interface, (3) treat AI-API egress from OT as a conduit requiring named approval and monitoring (NIS2 essential-entity reportable), (4) cross-walk to IEC 62443-3-3 SR 5.1 (network segmentation) for AI-API traffic.",
1860
1802
  "status": "open",
1861
1803
  "opened_date": "2026-05-11",
1862
- "evidence_cves": [
1863
- "CVE-2025-53773"
1864
- ],
1804
+ "evidence_cves": [],
1865
1805
  "atlas_refs": [
1866
1806
  "AML.T0051",
1867
1807
  "AML.T0054",
@@ -1897,9 +1837,7 @@
1897
1837
  "real_requirement": "MEASURE 2.5 must include adversarial evaluation: red-team testing for prompt injection, measurement of action boundary compliance (does the AI stay within authorized scope?), and behavioral regression testing after model updates.",
1898
1838
  "status": "open",
1899
1839
  "opened_date": "2026-01-01",
1900
- "evidence_cves": [
1901
- "CVE-2025-53773"
1902
- ],
1840
+ "evidence_cves": [],
1903
1841
  "atlas_refs": [
1904
1842
  "AML.T0051",
1905
1843
  "AML.T0054"
@@ -1932,9 +1870,7 @@
1932
1870
  "real_requirement": "V14 must add an AI configuration class: model + provider + system prompt + safety setting + data-retention setting under version control and review; MCP server registry source and signature policy verified; AI client tool allowlist treated as a security-relevant configuration object subject to change control and audit.",
1933
1871
  "status": "open",
1934
1872
  "opened_date": "2026-05-11",
1935
- "evidence_cves": [
1936
- "CVE-2026-30615"
1937
- ],
1873
+ "evidence_cves": [],
1938
1874
  "atlas_refs": [
1939
1875
  "AML.T0010",
1940
1876
  "AML.T0016"
@@ -1968,7 +1904,8 @@
1968
1904
  "status": "open",
1969
1905
  "opened_date": "2026-05-11",
1970
1906
  "evidence_cves": [
1971
- "CVE-2025-53773"
1907
+ "CVE-2026-39884",
1908
+ "CVE-2026-42208"
1972
1909
  ],
1973
1910
  "atlas_refs": [
1974
1911
  "AML.T0051",
@@ -2004,9 +1941,7 @@
2004
1941
  "real_requirement": "LLM02 must require: prompt-level data minimisation (DLP before send), DPIA-equivalent assessment when sensitive categories enter prompts (GDPR / UK ICO / AU Privacy Act / HIPAA), explicit provider data-retention contractual terms, and chained-scenario testing combining LLM01 + LLM02 (injection-driven exfiltration).",
2005
1942
  "status": "open",
2006
1943
  "opened_date": "2026-05-11",
2007
- "evidence_cves": [
2008
- "CVE-2025-53773"
2009
- ],
1944
+ "evidence_cves": [],
2010
1945
  "atlas_refs": [
2011
1946
  "AML.T0054"
2012
1947
  ],
@@ -2039,10 +1974,7 @@
2039
1974
  "real_requirement": "LLM06 must require: signed MCP server manifests, organisational tool allowlists enforced at the AI client, per-invocation authorisation scopes (not per-account), and supply-chain governance for AI tool plugins equivalent to critical third-party software (ISO A.8.30 / SOC 2 CC9 / NIST SA-12 extended).",
2040
1975
  "status": "open",
2041
1976
  "opened_date": "2026-05-11",
2042
- "evidence_cves": [
2043
- "CVE-2026-30615",
2044
- "CVE-2025-53773"
2045
- ],
1977
+ "evidence_cves": [],
2046
1978
  "atlas_refs": [
2047
1979
  "AML.T0010",
2048
1980
  "AML.T0016",
@@ -2113,10 +2045,7 @@
2113
2045
  "real_requirement": "WSTG v5 must add: (1) AI-API test class (prompt injection, jailbreak, model-DoS, embedding inversion, AI-API-as-C2 indicators), (2) MCP server test class (supply chain, tool-response injection, signature verification, allowlist bypass), (3) indirect prompt injection test methodology with named corpora (PR descriptions, web pages, ingest pipelines), (4) cross-walk to PTES, NIST 800-115, EU DORA TLPT, UK CHECK/CREST, AU IRAP.",
2114
2046
  "status": "open",
2115
2047
  "opened_date": "2026-05-11",
2116
- "evidence_cves": [
2117
- "CVE-2025-53773",
2118
- "CVE-2026-30615"
2119
- ],
2048
+ "evidence_cves": [],
2120
2049
  "atlas_refs": [
2121
2050
  "AML.T0010",
2122
2051
  "AML.T0043",
@@ -2186,9 +2115,7 @@
2186
2115
  "real_requirement": "6.4.3 operationalisation must add: (1) dynamic-content integrity (CSP report-uri + runtime DOM-equivalent hashes for AI-generated payment widgets), (2) agent-mediated checkout treated as in-scope with delegated-authority attestation, (3) MCP-server allowlisting on developer endpoints that touch payment-page test environments, (4) integrated reporting with PSD2 SCA-RTS Art. 18 + UK FCA SCA-RTS.",
2187
2116
  "status": "open",
2188
2117
  "opened_date": "2026-05-15",
2189
- "evidence_cves": [
2190
- "CVE-2025-53773"
2191
- ],
2118
+ "evidence_cves": [],
2192
2119
  "atlas_refs": [
2193
2120
  "AML.T0010",
2194
2121
  "AML.T0051"
@@ -2256,7 +2183,10 @@
2256
2183
  "opened_date": "2026-05-15",
2257
2184
  "evidence_cves": [],
2258
2185
  "atlas_refs": [],
2259
- "attack_refs": [],
2186
+ "attack_refs": [
2187
+ "T1573",
2188
+ "T1600"
2189
+ ],
2260
2190
  "theater_test": {
2261
2191
  "claim": "Our cryptographic suite review meets PCI DSS 4.0.1 12.3.3 annual cadence.",
2262
2192
  "test": "Pull the cryptographic suite inventory and most-recent annual review. Confirm enumeration of in-use algorithms with deprecation status. Confirm a PQC-readiness assessment exists with migration roadmap for long-lived keys (TLS for >5y data, signing for code/SBOM). Theater verdict if PQC is absent from the review, or if deprecated algorithms remain in use without a documented exception.",
@@ -2282,9 +2212,7 @@
2282
2212
  "real_requirement": "12.10.7 implementation must add: (1) AI-mediated PAN-exposure scenarios in the response-procedure template, (2) notification-clock harmonisation table covering card-brand + PSD2 + NIS2 + DORA + UK FCA + AU CPS 234, (3) AI-incident sub-classification in escalation routing, (4) customer-notification language addressing third-party-AI-provider exposure distinct from adversary exfiltration.",
2283
2213
  "status": "open",
2284
2214
  "opened_date": "2026-05-15",
2285
- "evidence_cves": [
2286
- "CVE-2025-53773"
2287
- ],
2215
+ "evidence_cves": [],
2288
2216
  "atlas_refs": [
2289
2217
  "AML.T0054",
2290
2218
  "AML.T0096"
@@ -2318,9 +2246,7 @@
2318
2246
  "real_requirement": "RTS-SCA (and UK FCA SCA-RTS, AU CDR) must define an agent-initiation construct: explicit delegated-authority attestation per agent transaction class, scope-limited authority tokens (amount, counterparty, frequency), and a distinct audit indicator for AI-mediated transactions so injected intent can be detected post-hoc. Aligns with eIDAS 2.0 electronic attestations.",
2319
2247
  "status": "open",
2320
2248
  "opened_date": "2026-05-11",
2321
- "evidence_cves": [
2322
- "CVE-2025-53773"
2323
- ],
2249
+ "evidence_cves": [],
2324
2250
  "atlas_refs": [
2325
2251
  "AML.T0051",
2326
2252
  "AML.T0054"
@@ -2354,10 +2280,7 @@
2354
2280
  "real_requirement": "PTES Pre-engagement must add: (1) named AI/MCP asset classes in the standard scoping checklist, (2) provider-side authorisation guidance and contractual carve-outs for prompt-injection testing, (3) rules-of-engagement language addressing AI-API egress as a potential exfiltration channel during the test, (4) cross-walk to TIBER-EU / DORA Art. 24 / UK CBEST / AU CORIE scoping for AI-augmented financial services TLPT.",
2355
2281
  "status": "open",
2356
2282
  "opened_date": "2026-05-11",
2357
- "evidence_cves": [
2358
- "CVE-2025-53773",
2359
- "CVE-2026-30615"
2360
- ],
2283
+ "evidence_cves": [],
2361
2284
  "atlas_refs": [
2362
2285
  "AML.T0010",
2363
2286
  "AML.T0051",
@@ -2393,8 +2316,9 @@
2393
2316
  "status": "open",
2394
2317
  "opened_date": "2026-05-11",
2395
2318
  "evidence_cves": [
2396
- "CVE-2025-53773",
2397
- "CVE-2026-30615"
2319
+ "CVE-2026-45321",
2320
+ "MAL-2026-3083",
2321
+ "MAL-2026-NODE-IPC-STEALER"
2398
2322
  ],
2399
2323
  "atlas_refs": [
2400
2324
  "AML.T0010",
@@ -2529,9 +2453,7 @@
2529
2453
  "real_requirement": "SPDX 3.0 deployment must require: (1) AI Profile + Dataset Profile completeness checks, (2) explicit declaration when training dataset provenance is unavailable (opacity flag), (3) MCP server inventory as a named SPDX element type, (4) CycloneDX ML-BOM cross-walk evidence — maintained as a cross-walk peer rather than a substitute. Aligns with EU CRA Annex I and ISO/IEC 5962.",
2530
2454
  "status": "open",
2531
2455
  "opened_date": "2026-05-11",
2532
- "evidence_cves": [
2533
- "CVE-2026-30615"
2534
- ],
2456
+ "evidence_cves": [],
2535
2457
  "atlas_refs": [
2536
2458
  "AML.T0010",
2537
2459
  "AML.T0018",
@@ -2565,9 +2487,7 @@
2565
2487
  "real_requirement": "CSCF v2026 1.1 must add: (1) explicit prohibition or strict gating of LLM assistants inside the SWIFT secure zone, (2) named-conduit treatment for AI-API egress from administrative jump zones with monitoring, (3) AI-generated message drafts flagged as a distinct review class before release, (4) alignment with DORA Art. 28 register of AI ICT third-party providers supporting critical functions, plus UK PRA SS1/21 and AU APRA CPS 234.",
2566
2488
  "status": "open",
2567
2489
  "opened_date": "2026-05-11",
2568
- "evidence_cves": [
2569
- "CVE-2025-53773"
2570
- ],
2490
+ "evidence_cves": [],
2571
2491
  "atlas_refs": [
2572
2492
  "AML.T0051",
2573
2493
  "AML.T0054",
@@ -2601,9 +2521,7 @@
2601
2521
  "real_requirement": "Board-level governance includes an AI-systems-in-use inventory, an MCP/plugin trust register with provenance attestation, and a documented assignment of accountability for AI security outcomes that maps to the NIS2/CCRA scope.",
2602
2522
  "status": "open",
2603
2523
  "opened_date": "2026-05-13",
2604
- "evidence_cves": [
2605
- "CVE-2026-30615"
2606
- ],
2524
+ "evidence_cves": [],
2607
2525
  "atlas_refs": [
2608
2526
  "AML.T0010"
2609
2527
  ],
@@ -2632,10 +2550,7 @@
2632
2550
  "real_requirement": "Identity controls treat AI agents as distinct principals where they execute tools; MCP plugin invocations log model decision + tool name + arguments + user identity; AI-provider service credentials are short-lived, rotated, and excluded from cleartext storage policy exceptions; passkeys/WebAuthn for human-operator-to-AI authentication where supported.",
2633
2551
  "status": "open",
2634
2552
  "opened_date": "2026-05-13",
2635
- "evidence_cves": [
2636
- "CVE-2025-53773",
2637
- "CVE-2026-30615"
2638
- ],
2553
+ "evidence_cves": [],
2639
2554
  "atlas_refs": [
2640
2555
  "AML.T0010",
2641
2556
  "AML.T0051"
@@ -2667,10 +2582,7 @@
2667
2582
  "real_requirement": "Security monitoring includes prompt/response content classification on egress to AI providers, MCP tool-call audit trail (model decision + tool name + arguments + result), AI-API traffic baselines per service identity with anomaly alerts, and unified retention covering AI events alongside classical telemetry.",
2668
2583
  "status": "open",
2669
2584
  "opened_date": "2026-05-13",
2670
- "evidence_cves": [
2671
- "CVE-2025-53773",
2672
- "CVE-2026-30615"
2673
- ],
2585
+ "evidence_cves": [],
2674
2586
  "atlas_refs": [
2675
2587
  "AML.T0096",
2676
2588
  "AML.T0024",
@@ -2703,11 +2615,7 @@
2703
2615
  "real_requirement": "Response plans include live kernel patching as a documented capability with operator drill cadence; AI-incident playbooks cover model rollback, prompt classifier updates, MCP allowlist tightening; backups validate AI-system artefacts; recovery clocks align to NIS2 24h + DORA 4h + GDPR 72h notification matrix.",
2704
2616
  "status": "open",
2705
2617
  "opened_date": "2026-05-13",
2706
- "evidence_cves": [
2707
- "CVE-2026-31431",
2708
- "CVE-2026-43284",
2709
- "CVE-2026-43500"
2710
- ],
2618
+ "evidence_cves": [],
2711
2619
  "atlas_refs": [],
2712
2620
  "attack_refs": [
2713
2621
  "T1068"
@@ -2737,10 +2645,7 @@
2737
2645
  "real_requirement": "CSAF 2.1 (or a successor profile) must add: (1) an AI-component identifier scheme (model + version + adapters + tokenizer), (2) AI-specific vulnerability classes (jailbreak class, prompt-injection vector, embedding inversion class) with VEX statements, (3) explicit chaining of base-model to derived-model VEX statements, (4) alignment with EU AI Act Art. 15 disclosure obligations, UK NCSC AI vulnerability disclosure, AU ISM AI annex.",
2738
2646
  "status": "open",
2739
2647
  "opened_date": "2026-05-11",
2740
- "evidence_cves": [
2741
- "CVE-2025-53773",
2742
- "CVE-2026-30615"
2743
- ],
2648
+ "evidence_cves": [],
2744
2649
  "atlas_refs": [
2745
2650
  "AML.T0010",
2746
2651
  "AML.T0018"
@@ -3053,7 +2958,9 @@
3053
2958
  "real_requirement": "Extend IA-5 to the IdP control plane: continuous attestation of token-signing certificate fingerprints + claim-transformation rule baseline + per-modification change-control attestation + management-API-token inventory with TTL + scope + source-IP enforcement.",
3054
2959
  "status": "open",
3055
2960
  "opened_date": "2026-05-15",
3056
- "evidence_cves": [],
2961
+ "evidence_cves": [
2962
+ "MAL-2026-NODE-IPC-STEALER"
2963
+ ],
3057
2964
  "atlas_refs": [],
3058
2965
  "attack_refs": [
3059
2966
  "T1556.007",
@@ -3746,8 +3653,7 @@
3746
3653
  "status": "open",
3747
3654
  "opened_date": "2026-05-15",
3748
3655
  "evidence_cves": [
3749
- "CVE-2026-0300",
3750
- "CVE-2026-42897"
3656
+ "CVE-2026-0300"
3751
3657
  ],
3752
3658
  "atlas_refs": [],
3753
3659
  "attack_refs": [
@@ -3782,7 +3688,8 @@
3782
3688
  "opened_date": "2026-05-15",
3783
3689
  "evidence_cves": [
3784
3690
  "CVE-2026-0300",
3785
- "CVE-2026-42897"
3691
+ "CVE-2026-42897",
3692
+ "CVE-2026-46300"
3786
3693
  ],
3787
3694
  "atlas_refs": [],
3788
3695
  "attack_refs": [
@@ -3887,8 +3794,8 @@
3887
3794
  "status": "open",
3888
3795
  "opened_date": "2026-05-15",
3889
3796
  "evidence_cves": [
3890
- "CVE-2026-6973",
3891
- "CVE-2026-33825"
3797
+ "CVE-2026-33825",
3798
+ "CVE-2026-6973"
3892
3799
  ],
3893
3800
  "atlas_refs": [],
3894
3801
  "attack_refs": [
@@ -3954,9 +3861,9 @@
3954
3861
  "status": "open",
3955
3862
  "opened_date": "2026-05-15",
3956
3863
  "evidence_cves": [
3957
- "CVE-2026-6973",
3958
3864
  "CVE-2026-32202",
3959
- "CVE-2026-33825"
3865
+ "CVE-2026-33825",
3866
+ "CVE-2026-6973"
3960
3867
  ],
3961
3868
  "atlas_refs": [],
3962
3869
  "attack_refs": [
@@ -3989,8 +3896,7 @@
3989
3896
  "status": "open",
3990
3897
  "opened_date": "2026-05-15",
3991
3898
  "evidence_cves": [
3992
- "CVE-2026-32202",
3993
- "CVE-2026-33825"
3899
+ "CVE-2026-32202"
3994
3900
  ],
3995
3901
  "atlas_refs": [],
3996
3902
  "attack_refs": [
@@ -4042,5 +3948,135 @@
4042
3948
  ],
4043
3949
  "verdict_when_failed": "compliance-theater"
4044
3950
  }
3951
+ },
3952
+ "UK-CAF-B4": {
3953
+ "framework": "UK NCSC Cyber Assessment Framework (CAF)",
3954
+ "control_id": "B4",
3955
+ "control_name": "System security",
3956
+ "designed_for": "Principle B4 — networks and information systems supporting essential functions are protected against attack. Covers secure configuration, secure architecture, and the management of vulnerabilities in deployed systems.",
3957
+ "misses": [
3958
+ "Subsystem-level kernel-module disable as a compensating control for an unpatched deterministic local-privilege-escalation is not enumerated as an interim posture distinct from vendor-patch application",
3959
+ "CAF assumes patch-application timelines tied to advisory dates; deterministic LPEs with public PoC require operational pivots (module unload, syscall filter) that the principle does not name",
3960
+ "Where vendor patch + reboot cycle is multi-day on operationally-sensitive hosts, the absence of a named compensating-control path forces operators to either accept the exposure window or schedule disruptive reboots without policy cover"
3961
+ ],
3962
+ "real_requirement": "B4 implementation must explicitly enumerate compensating-control postures for unpatched deterministic LPEs: kernel-module blacklist (esp4 / esp6 / rxrpc class), syscall filter (seccomp profile narrowing), or live-patch where vendor offers it. Each compensating control must be reversible, monitored, and have a documented conversion-SLA to the vendor binary patch.",
3963
+ "status": "open",
3964
+ "opened_date": "2026-05-17",
3965
+ "evidence_cves": [
3966
+ "CVE-2026-46300"
3967
+ ],
3968
+ "atlas_refs": [],
3969
+ "attack_refs": [
3970
+ "T1068"
3971
+ ],
3972
+ "theater_test": {
3973
+ "claim": "Our UK CAF B4 system-security posture covers unpatched kernel LPEs with documented compensating controls.",
3974
+ "test": "Pull the operator's B4 evidence pack. For the most recent deterministic kernel LPE with public PoC (CVE-2026-46300 / Fragnesia is the reference case), confirm whether the evidence pack names a compensating-control posture (module unload, syscall filter, or live-patch) distinct from the binary-patch path, and whether that posture is monitored and has a conversion-SLA back to the binary patch. Theater verdict if the evidence pack reduces to 'patch within 30 days' without a named interim compensating control, or if the compensating control is deployed without monitoring and SLA.",
3975
+ "evidence_required": [
3976
+ "B4 evidence pack covering the most recent deterministic kernel LPE",
3977
+ "named compensating-control posture (module blacklist, seccomp, live-patch) with monitoring",
3978
+ "conversion-SLA documenting return-to-binary-patch timeline"
3979
+ ],
3980
+ "verdict_when_failed": "compliance-theater"
3981
+ }
3982
+ },
3983
+ "AU-ISM-1546": {
3984
+ "framework": "Australian Government Information Security Manual (ISM)",
3985
+ "control_id": "ISM-1546",
3986
+ "control_name": "Patch operating systems and applications",
3987
+ "designed_for": "Patching operating systems and applications within timeframes set by the Essential Eight Maturity Model — ML1: 1 month for non-critical, 2 weeks for internet-facing; ML2: 2 weeks for non-critical, 48 hours for internet-facing or exploited; ML3: 48 hours for non-critical, 48 hours for internet-facing or exploited.",
3988
+ "misses": [
3989
+ "Patch-application timeframes anchor on advisory date, not on public-PoC availability — a deterministic LPE with a public PoC is exploitable from disclosure-minus-zero regardless of the 48h ML3 window",
3990
+ "The maturity ladder does not differentiate between exploitable-from-disclosure (public PoC + deterministic primitive) and theoretically-exploitable, so the highest-tempo bucket is still slower than the threat",
3991
+ "No requirement to deploy reversible compensating controls (kernel-module blacklist, syscall filter) while the patch cycle proceeds, even when the vendor offers them in the same advisory window"
3992
+ ],
3993
+ "real_requirement": "ISM-1546 implementation must add: (1) a PoC-availability-aware tempo overlay where deterministic LPEs with public PoCs trigger a same-day-mitigation requirement separate from patch SLA, (2) a named compensating-control posture per maturity level (module blacklist at ML1, seccomp at ML2, live-patch at ML3), (3) explicit evidence that the operator inspected the advisory for non-binary mitigation paths before defaulting to the patch-only response.",
3994
+ "status": "open",
3995
+ "opened_date": "2026-05-17",
3996
+ "evidence_cves": [
3997
+ "CVE-2026-46300"
3998
+ ],
3999
+ "atlas_refs": [],
4000
+ "attack_refs": [
4001
+ "T1068"
4002
+ ],
4003
+ "theater_test": {
4004
+ "claim": "Our AU ISM-1546 patch programme meets Essential Eight Maturity Level 3 for kernel-class vulnerabilities.",
4005
+ "test": "Pull the patch-management evidence pack and select the most recent deterministic kernel LPE with public PoC (CVE-2026-46300 / Fragnesia is the reference case). Confirm whether the evidence shows (a) same-day deployment of a named compensating control (module blacklist, seccomp profile, live-patch) distinct from the binary patch, and (b) the operator documented inspection of the advisory for non-binary mitigation before defaulting to the patch SLA. Theater verdict if the evidence collapses to 'patch within 48h' without a named same-day compensating control, or if the compensating control was deployed without advisory-side evidence of evaluation.",
4006
+ "evidence_required": [
4007
+ "patch-management evidence pack for the reference deterministic LPE",
4008
+ "same-day compensating-control deployment record",
4009
+ "advisory inspection notes documenting non-binary mitigation evaluation"
4010
+ ],
4011
+ "verdict_when_failed": "compliance-theater"
4012
+ }
4013
+ },
4014
+ "ISO-27001-2022-A.5.7": {
4015
+ "framework": "ISO/IEC 27001:2022",
4016
+ "control_id": "A.5.7",
4017
+ "control_name": "Threat intelligence",
4018
+ "designed_for": "Information about information-security threats is collected and analysed to produce threat intelligence. Output feeds risk-management, vulnerability-management, incident-management, and awareness programmes.",
4019
+ "misses": [
4020
+ "Threat intelligence collection is treated as feed ingestion; the control does not require an operational pivot when intel surfaces a same-family sequel to a previously-patched bug (Dirty Frag → Fragnesia is the reference case)",
4021
+ "AI-attack-development feeds (AI-assisted discovery, AI-built exploitation chains, AI-orchestrated supply-chain attacks) are not explicitly enumerated as a feed category, despite being a current-reality threat per Hard Rule #7",
4022
+ "Threat-intelligence-to-action latency is undefined; intel may be 'collected' weeks before the operational response, with no control text requiring conversion-SLA from intel to action"
4023
+ ],
4024
+ "real_requirement": "A.5.7 implementation must add: (1) AI-attack-development feeds as a named feed category (GTIG zero-day attribution, Anthropic / OpenAI / Google threat reports, Zellic / depthfirst / Big Sleep disclosure channels), (2) intel-to-action conversion-SLA per threat category (deterministic LPE same-family sequel: 24h to compensating control), (3) explicit operational-pivot list mapping intel signal to immediate non-patch action (module blacklist, syscall filter, egress block, MFA enforcement).",
4025
+ "status": "open",
4026
+ "opened_date": "2026-05-17",
4027
+ "evidence_cves": [
4028
+ "CVE-2026-46300"
4029
+ ],
4030
+ "atlas_refs": [
4031
+ "AML.T0010"
4032
+ ],
4033
+ "attack_refs": [
4034
+ "T1068"
4035
+ ],
4036
+ "theater_test": {
4037
+ "claim": "Our ISO 27001:2022 A.5.7 threat-intelligence programme drives operational action against current-reality threats including AI-assisted attack development.",
4038
+ "test": "Pull the threat-intelligence feed inventory and the last 12 months of intel-driven action records. Confirm explicit enumeration of AI-attack-development feed sources (GTIG, vendor threat reports, AI-assisted-disclosure outlets). Confirm an intel-to-action conversion-SLA per threat category. Sample the most recent same-family sequel disclosure (Fragnesia following Dirty Frag, or equivalent) and verify a compensating-control action fired within the SLA. Theater verdict if AI-attack-development feeds are absent from the inventory, or if intel-to-action conversion-SLA is undocumented, or if the sampled same-family sequel produced no operational pivot.",
4039
+ "evidence_required": [
4040
+ "threat-intelligence feed inventory with AI-attack-development category",
4041
+ "intel-to-action conversion-SLA per threat category",
4042
+ "operational pivot record for the most recent same-family sequel disclosure"
4043
+ ],
4044
+ "verdict_when_failed": "compliance-theater"
4045
+ }
4046
+ },
4047
+ "NIS2-Art21-supply-chain": {
4048
+ "framework": "EU NIS2 Directive (Directive (EU) 2022/2555)",
4049
+ "control_id": "Art-21-supply-chain",
4050
+ "control_name": "Supply chain security measures",
4051
+ "designed_for": "Article 21(2)(d) — supply-chain security including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers. Covers risk-management measures for the supply chain, including transitive dependencies where systemically relevant.",
4052
+ "misses": [
4053
+ "Generic supply-chain controls do not address ecosystem-specific compromise classes — npm registry account-recovery via expired maintainer-email domain, postinstall vs main-module payload distinction, and registry-account MFA enforcement are not enumerated",
4054
+ "Container-runtime supply chain is not differentiated from application-runtime supply chain — the runtime (containerd, runc, CRI-O) and the workloads it executes have different exposure shapes that the directive collapses",
4055
+ "Maintainer-account integrity is presumed; the directive does not require monitoring of maintainer-email-domain expiry, registry-side MFA enforcement on critical-path packages, or post-publish freshness cooldowns as protective measures"
4056
+ ],
4057
+ "real_requirement": "NIS2 Art. 21 supply-chain measures must add ecosystem-specific controls: (1) container-runtime supply chain enumerated distinct from application supply chain with separate risk-management posture, (2) npm / PyPI / RubyGems / crates.io maintainer-account integrity monitoring (email-domain expiry, MFA enforcement, registry-side anomaly detection), (3) post-publish cooldown periods on consumption of fresh releases from systemically-important upstream maintainers, (4) postinstall vs main-module payload distinction in consumer-side defence (--ignore-scripts is insufficient against main-module payloads), (5) lockfile audit against known-malicious version sets during the active exposure window.",
4058
+ "status": "open",
4059
+ "opened_date": "2026-05-17",
4060
+ "evidence_cves": [
4061
+ "MAL-2026-NODE-IPC-STEALER"
4062
+ ],
4063
+ "atlas_refs": [
4064
+ "AML.T0010",
4065
+ "AML.T0020"
4066
+ ],
4067
+ "attack_refs": [
4068
+ "T1195.001",
4069
+ "T1195.002"
4070
+ ],
4071
+ "theater_test": {
4072
+ "claim": "Our NIS2 Art. 21 supply-chain security programme covers ecosystem-specific compromise classes including container runtime and registry account-recovery abuse.",
4073
+ "test": "Pull the supply-chain risk-management evidence pack. Confirm container-runtime supply chain is enumerated distinct from application supply chain. Confirm maintainer-account integrity monitoring (email-domain expiry tracking, registry-side MFA enforcement evidence) for critical-path packages. Sample the most recent registry account-recovery incident (MAL-2026-NODE-IPC-STEALER reference case) and verify the consumer-side response covered lockfile audit against the malicious version set during the exposure window. Theater verdict if container runtime and application runtime collapse into a single supply-chain register, or if maintainer-account integrity monitoring is undocumented, or if the sampled incident response did not include lockfile audit within the exposure window.",
4074
+ "evidence_required": [
4075
+ "supply-chain register differentiating container runtime from application runtime",
4076
+ "maintainer-account integrity monitoring records for critical-path packages",
4077
+ "lockfile audit log from the reference registry account-recovery incident"
4078
+ ],
4079
+ "verdict_when_failed": "compliance-theater"
4080
+ }
4045
4081
  }
4046
4082
  }