@blamejs/exceptd-skills 0.12.40 → 0.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (97) hide show
  1. package/AGENTS.md +17 -0
  2. package/ARCHITECTURE.md +7 -4
  3. package/CHANGELOG.md +215 -248
  4. package/CONTEXT.md +2 -2
  5. package/README.md +2 -8
  6. package/agents/threat-researcher.md +2 -2
  7. package/bin/exceptd.js +179 -81
  8. package/data/_indexes/_meta.json +50 -50
  9. package/data/_indexes/activity-feed.json +1 -1
  10. package/data/_indexes/catalog-summaries.json +1 -1
  11. package/data/_indexes/chains.json +485 -13
  12. package/data/_indexes/frequency.json +4 -0
  13. package/data/_indexes/jurisdiction-map.json +15 -4
  14. package/data/_indexes/section-offsets.json +1224 -1224
  15. package/data/_indexes/token-budget.json +170 -170
  16. package/data/atlas-ttps.json +54 -11
  17. package/data/attack-techniques.json +113 -17
  18. package/data/cve-catalog.json +38 -52
  19. package/data/cwe-catalog.json +8 -2
  20. package/data/exploit-availability.json +1 -0
  21. package/data/framework-control-gaps.json +149 -6
  22. package/data/global-frameworks.json +1 -0
  23. package/data/playbooks/ai-api.json +5 -0
  24. package/data/playbooks/cicd-pipeline-compromise.json +970 -0
  25. package/data/playbooks/cloud-iam-incident.json +4 -1
  26. package/data/playbooks/cred-stores.json +10 -0
  27. package/data/playbooks/crypto-codebase.json +13 -0
  28. package/data/playbooks/framework.json +16 -0
  29. package/data/playbooks/hardening.json +4 -0
  30. package/data/playbooks/identity-sso-compromise.json +951 -0
  31. package/data/playbooks/idp-incident.json +3 -0
  32. package/data/playbooks/kernel.json +6 -0
  33. package/data/playbooks/llm-tool-use-exfil.json +963 -0
  34. package/data/playbooks/mcp.json +6 -0
  35. package/data/playbooks/runtime.json +4 -0
  36. package/data/playbooks/sbom.json +13 -0
  37. package/data/playbooks/secrets.json +6 -0
  38. package/data/playbooks/webhook-callback-abuse.json +916 -0
  39. package/data/zeroday-lessons.json +1 -0
  40. package/lib/cross-ref-api.js +33 -13
  41. package/lib/cve-curation.js +12 -1
  42. package/lib/exit-codes.js +29 -0
  43. package/lib/lint-skills.js +25 -3
  44. package/lib/playbook-runner.js +8 -4
  45. package/lib/refresh-external.js +10 -1
  46. package/lib/scoring.js +64 -1
  47. package/lib/sign.js +40 -7
  48. package/lib/verify.js +5 -5
  49. package/manifest.json +83 -83
  50. package/orchestrator/README.md +7 -7
  51. package/orchestrator/index.js +46 -25
  52. package/orchestrator/scheduler.js +2 -2
  53. package/package.json +1 -1
  54. package/sbom.cdx.json +135 -91
  55. package/scripts/check-test-coverage.js +6 -6
  56. package/scripts/predeploy.js +7 -13
  57. package/scripts/refresh-reverse-refs.js +107 -20
  58. package/scripts/refresh-sbom.js +21 -4
  59. package/skills/age-gates-child-safety/skill.md +1 -5
  60. package/skills/ai-attack-surface/skill.md +11 -4
  61. package/skills/ai-c2-detection/skill.md +11 -2
  62. package/skills/ai-risk-management/skill.md +4 -2
  63. package/skills/api-security/skill.md +7 -8
  64. package/skills/attack-surface-pentest/skill.md +2 -2
  65. package/skills/cloud-iam-incident/skill.md +1 -5
  66. package/skills/cloud-security/skill.md +0 -4
  67. package/skills/compliance-theater/skill.md +10 -2
  68. package/skills/container-runtime-security/skill.md +1 -3
  69. package/skills/dlp-gap-analysis/skill.md +3 -4
  70. package/skills/email-security-anti-phishing/skill.md +1 -8
  71. package/skills/exploit-scoring/skill.md +7 -2
  72. package/skills/framework-gap-analysis/skill.md +1 -1
  73. package/skills/fuzz-testing-strategy/skill.md +1 -2
  74. package/skills/global-grc/skill.md +3 -2
  75. package/skills/identity-assurance/skill.md +1 -3
  76. package/skills/idp-incident-response/skill.md +1 -4
  77. package/skills/incident-response-playbook/skill.md +1 -5
  78. package/skills/kernel-lpe-triage/skill.md +2 -2
  79. package/skills/mcp-agent-trust/skill.md +13 -3
  80. package/skills/mlops-security/skill.md +3 -4
  81. package/skills/ot-ics-security/skill.md +0 -3
  82. package/skills/policy-exception-gen/skill.md +11 -3
  83. package/skills/pqc-first/skill.md +4 -2
  84. package/skills/rag-pipeline-security/skill.md +2 -0
  85. package/skills/ransomware-response/skill.md +1 -5
  86. package/skills/researcher/skill.md +4 -3
  87. package/skills/sector-energy/skill.md +0 -4
  88. package/skills/sector-federal-government/skill.md +2 -3
  89. package/skills/sector-financial/skill.md +1 -4
  90. package/skills/sector-healthcare/skill.md +0 -5
  91. package/skills/sector-telecom/skill.md +0 -4
  92. package/skills/security-maturity-tiers/skill.md +1 -2
  93. package/skills/skill-update-loop/skill.md +4 -3
  94. package/skills/supply-chain-integrity/skill.md +4 -3
  95. package/skills/threat-model-currency/skill.md +1 -1
  96. package/skills/threat-modeling-methodology/skill.md +2 -1
  97. package/skills/webapp-security/skill.md +0 -5
@@ -17,9 +17,10 @@ triggers:
17
17
  - multi-jurisdiction
18
18
  - global compliance
19
19
  data_deps:
20
- - global-frameworks.json
21
- - framework-control-gaps.json
22
20
  - atlas-ttps.json
21
+ - exploit-availability.json
22
+ - framework-control-gaps.json
23
+ - global-frameworks.json
23
24
  atlas_refs: []
24
25
  attack_refs: []
25
26
  framework_gaps: []
@@ -21,10 +21,8 @@ triggers:
21
21
  - phishing-resistant
22
22
  data_deps:
23
23
  - cve-catalog.json
24
- - atlas-ttps.json
24
+ - exploit-availability.json
25
25
  - framework-control-gaps.json
26
- - cwe-catalog.json
27
- - d3fend-catalog.json
28
26
  - rfc-references.json
29
27
  atlas_refs:
30
28
  - AML.T0051
@@ -29,11 +29,8 @@ triggers:
29
29
  - tenant compromise
30
30
  data_deps:
31
31
  - cve-catalog.json
32
- - attack-techniques.json
33
- - framework-control-gaps.json
34
- - global-frameworks.json
35
- - cwe-catalog.json
36
32
  - d3fend-catalog.json
33
+ - framework-control-gaps.json
37
34
  atlas_refs: []
38
35
  attack_refs:
39
36
  - T1078.004
@@ -17,12 +17,8 @@ triggers:
17
17
  - prompt injection incident
18
18
  - model exfiltration incident
19
19
  data_deps:
20
- - cve-catalog.json
21
- - atlas-ttps.json
22
- - framework-control-gaps.json
23
- - global-frameworks.json
24
- - cwe-catalog.json
25
20
  - d3fend-catalog.json
21
+ - framework-control-gaps.json
26
22
  - zeroday-lessons.json
27
23
  atlas_refs:
28
24
  - AML.T0096
@@ -15,8 +15,8 @@ triggers:
15
15
  - kernel patch
16
16
  - live kernel patch
17
17
  data_deps:
18
- - cve-catalog.json
19
- - exploit-availability.json
18
+ - d3fend-catalog.json
19
+ - rfc-references.json
20
20
  atlas_refs: []
21
21
  attack_refs:
22
22
  - T1068
@@ -14,9 +14,11 @@ triggers:
14
14
  - claude code security
15
15
  - ai agent security
16
16
  data_deps:
17
- - cve-catalog.json
18
17
  - atlas-ttps.json
19
- - framework-control-gaps.json
18
+ - cve-catalog.json
19
+ - d3fend-catalog.json
20
+ - exploit-availability.json
21
+ - rfc-references.json
20
22
  atlas_refs:
21
23
  - AML.T0010
22
24
  - AML.T0016
@@ -65,7 +67,7 @@ forward_watch:
65
67
  - Pwn2Own Berlin 2026 (disclosed 2026-05-14, embargo ends 2026-08-12) — LiteLLM full SSRF + Code Injection by Out Of Bounds (Byung Young Yi); duplicate-class with the k3vg3n entry; track unified patch advisory
66
68
  - Pwn2Own Berlin 2026 (disclosed 2026-05-14, embargo ends 2026-08-12) — LM Studio 5-bug exploit chain by STARLabs SG; impacts local MCP/agent runtime trust; track patch and integration advisories
67
69
  - Pwn2Own Berlin 2026 (disclosed 2026-05-14, embargo ends 2026-08-12) — Claude Code MCP collision-scored entry by Viettel Cyber Security; CVE in flight; track MCP trust and tool-collision advisory
68
- last_threat_review: "2026-05-15"
70
+ last_threat_review: "2026-05-17"
69
71
  ---
70
72
 
71
73
  # MCP Agent Trust Assessment
@@ -142,6 +144,14 @@ Every MCP server listed in popular registries (MCP Hub, npm `@modelcontextprotoc
142
144
  | CIS Controls v8 | Control 2 (Inventory and Control of Software Assets) | Software inventory and allowlisting. Does not explicitly cover MCP servers. AI coding assistant MCP configs are not in scope for most enterprise software inventory processes. |
143
145
  | PCI DSS 4.0 | 12.3.4 | Review and manage third-party service providers. Scoped to service providers with access to cardholder data. An MCP server running on a developer workstation accessing a PCI-scoped codebase is not clearly in scope and would not appear in vendor management reviews. |
144
146
  | SWIFT CSCF v2026 | 1.1 (SWIFT Environment Protection — allowlisted software inside the secure zone) | Mandates allowlisted software and protected operator-PC posture for the SWIFT secure zone. The control's allowlist concept is the closest existing analogue to MCP tool allowlisting, but CSCF 1.1 was written for traditional middleware and does not contemplate MCP servers, agent-mediated tool calls, or model-judgment-as-authorization on operator workstations adjacent to the SWIFT zone. |
147
+ | EU NIS2 | Art. 21(2)(d) (supply-chain security) + Art. 21(2)(e) (security in acquisition, development and maintenance) | "Appropriate and proportionate" supply-chain language. Member-state transpositions (BSI IT-SiG 2.0, ANSSI, CNIL) do not enumerate MCP servers as in-scope third-party components. An essential entity meets the NIS2 supplier-management obligation with traditional SaaS vendor reviews while leaving developer-workstation MCP servers entirely outside the supply-chain register. |
148
+ | EU DORA | Art. 28 (ICT third-party risk register) + Art. 30 (key contractual provisions) + Art. 6 (ICT risk-management framework) | Financial-entity ICT third-party language scoped to traditional ICT providers and cloud outsourcing. ESAs RTS on subcontracting (JC 2024/53) is silent on MCP servers running inside trading-desk developer environments, even though those MCP servers can reach repository, trading-system, and ticketing-system tools via the AI assistant. |
149
+ | EU AI Act (Regulation 2024/1689) | Art. 9 (risk management for high-risk AI) + Art. 15 (cybersecurity) + Art. 25 (responsibilities along the AI value chain) | Art. 25 addresses providers, deployers, importers, and distributors but does not categorize MCP server publishers as in-scope value-chain actors. High-risk AI cybersecurity language refers to "state of the art" without naming MCP supply chain as a scoped attack class. |
150
+ | UK NCSC CAF | Principle A4 (Supply Chain), B4 (System Security), B2 (Identity and Access Control) | Outcome-based language. NCSC's 2024 guidance on securing AI systems names supply-chain integrity for AI tooling, but the CAF outcome statements are unchanged — an organisation can achieve A4 / B4 outcomes at Achieved level with zero MCP server allowlisting, no signature verification, and no per-server authentication. |
151
+ | UK DSIT AI Cyber Code of Practice (2025) | Principle 7 (secure software supply chain) + Principle 8 (secure development) | Names supply-chain integrity for AI development but as a principle, not a testable control. No technical floor for MCP signing, allowlisting, or per-server auth. |
152
+ | AU ASD Essential 8 | Strategy: Application Control + Restrict Administrative Privileges | Application Control (allowlisting) is the closest existing strategy to MCP allowlisting but is scoped to operating-system-level executables. MCP servers run as long-lived child processes spawned by the AI assistant's process — Application Control rarely reaches the npm/pip-installed JavaScript or Python that constitutes an MCP server. None of the eight strategies address agent-mediated tool execution. |
153
+ | AU ASD ISM | ISM-1728 (managing cyber supply chain risk) + ISM-1808 (cloud consumer responsibilities) + ISM-0935 (application control) | ISM-1728 supply-chain language is scoped to traditional vendor classes; MCP servers fall outside enumerated supply-chain categories. ISM-0935 application control is operating-system-level and does not reach package-level MCP servers. |
154
+ | AU APRA CPS 234 / CPS 230 | Para 27 (information security capability) + CPS 230 ICT-service-provider obligations | "Capability commensurate with vulnerabilities and threats" language. APRA-regulated entities deploying AI coding assistants meet CPS 234 attestation with traditional vendor-management capability; MCP-specific supply-chain capability is not an examined control. CPS 230 (effective 2025-07-01) third-party-arrangements obligations do not enumerate MCP servers as in-scope material service providers. |
145
155
 
146
156
  **Fundamental gap:** No current framework has a control category for "AI tool trust boundaries" — the concept that an AI model can be the authorization mechanism for code execution, and that this creates a new class of supply chain and access control risk.
147
157
 
@@ -20,12 +20,11 @@ triggers:
20
20
  - drift detection
21
21
  - model monitoring
22
22
  data_deps:
23
- - cve-catalog.json
24
23
  - atlas-ttps.json
25
- - framework-control-gaps.json
24
+ - cve-catalog.json
26
25
  - cwe-catalog.json
27
26
  - d3fend-catalog.json
28
- - rfc-references.json
27
+ - framework-control-gaps.json
29
28
  atlas_refs:
30
29
  - AML.T0010
31
30
  - AML.T0018
@@ -61,7 +60,7 @@ forward_watch:
61
60
  - OpenSSF model-signing emergence to v1.0 — Sigstore-based model-weight signing; track for production adoption and admission-control integration
62
61
  - SLSA v1.1 ML profile (draft) — model-provenance extension for training-run attestation chains; track ID and section changes
63
62
  - EU AI Act high-risk technical-file implementing acts (2026-2027) — operational requirements for Article 10 / 13 / 15 documentation may pin ML-BOM or model-signing
64
- - MITRE ATLAS v5.4.0 (released February 2026) shipped the AML.T0010 sub-technique expansion this forecast tracked plus new techniques ("Publish Poisoned AI Agent Tool", "Escape to Host"); inventory now 16 tactics, 84 techniques, 56 sub-techniques. Forward watch: ATLAS v5.5 / v6.0 — track next-cadence updates to agentic-AI TTPs and MLOps-pipeline-specific techniques
63
+ - MITRE ATLAS v5.4.0 (released February 2026) shipped the AML.T0010 sub-technique expansion this forecast tracked plus new techniques ("Publish Poisoned AI Agent Tool", "Escape to Host"); inventory now 16 tactics, 84 techniques, 56 sub-techniques. Forward watch: subsequent ATLAS minor and major releases — track next-cadence updates to agentic-AI TTPs and MLOps-pipeline-specific techniques
65
64
  last_threat_review: "2026-05-15"
66
65
  ---
67
66
 
@@ -20,9 +20,6 @@ triggers:
20
20
  - purdue
21
21
  data_deps:
22
22
  - cve-catalog.json
23
- - atlas-ttps.json
24
- - framework-control-gaps.json
25
- - cwe-catalog.json
26
23
  - d3fend-catalog.json
27
24
  atlas_refs:
28
25
  - AML.T0010
@@ -12,8 +12,9 @@ triggers:
12
12
  - zero trust exception
13
13
  - compensating control
14
14
  data_deps:
15
- - framework-control-gaps.json
16
- - global-frameworks.json
15
+ - atlas-ttps.json
16
+ - cve-catalog.json
17
+ - exploit-availability.json
17
18
  atlas_refs: []
18
19
  attack_refs: []
19
20
  framework_gaps: []
@@ -22,7 +23,7 @@ forward_watch:
22
23
  - EU CRA exceptions for AI pipeline components
23
24
  - NIST SP 800-204 series updates for microservices
24
25
  - FedRAMP updates for container/serverless authorization
25
- last_threat_review: "2026-05-01"
26
+ last_threat_review: "2026-05-17"
26
27
  ---
27
28
 
28
29
  # Policy Exception Generation
@@ -75,6 +76,13 @@ Per-framework lag statements for each exception category in this skill:
75
76
  | PCI DSS 4.0 | 12.3.4 (Inventory of system components) | Persistent-asset assumption — fails for autoscaled ephemeral compute. |
76
77
  | PCI DSS 4.0 | 1.3 (Network segmentation) | Implicit perimeter-trust model; ZTA evidence shape does not match the language. |
77
78
  | NIS2 | Art. 21 (Cybersecurity risk-management measures) | Asset register and patch management language predates serverless; ephemeral nodes cannot be inventoried as the article assumes. |
79
+ | EU DORA | Art. 8 (ICT-related risk and ICT asset management) + Art. 9 (protection and prevention) + Art. 28 (ICT third-party risk) | Financial-entity asset register and patch-management obligations mirror the NIS2 lag: ephemeral compute has no clean register fit, and Art. 28 ICT third-party register is silent on LLM API providers and developer-environment MCP servers. ESAs RTS on subcontracting (JC 2024/53) does not enumerate AI/ML SaaS classes. |
80
+ | EU AI Act (Regulation 2024/1689) | Art. 13 (transparency / instructions for use) + Art. 15 (cybersecurity for high-risk AI) | Drafted around vendor-provided AI systems with documented change-management. External provider model updates that change behavior mid-deployment have no exception language; high-risk AI Art. 15 cybersecurity expectations assume operator control over the model. |
81
+ | UK NCSC CAF | Principle A2 (Risk Management), A4 (Supply Chain), B4 (System Security) | Outcome-based assessment. NCSC Cloud Security Principles and ZT Architecture Design Principles (NCSC 2024) recognize ephemeral and identity-centric architectures, but the CAF outcome statements do not enumerate ZTA / ephemeral / AI-model-update as explicit deviation classes. Exception language must map the operator's compensating-control bundle to the CAF principle's outcome rather than to a prescriptive control. |
82
+ | UK Cyber Essentials Plus | Patch management + Secure Configuration criteria | 14-day patch SLA assumes persistent assets the operator patches. Ephemeral / immutable / provider-patched runtimes (Lambda, Cloud Run, Cloudflare Workers) fall outside the criterion as written. The CE+ assessor expects a documented justification when a service does not fit the standard model. |
83
+ | AU ASD Essential 8 | Patch Applications + Patch Operating Systems + Application Control (ML1-ML3) | Patch-window language assumes a persistent OS / application installation the operator patches. Ephemeral container workloads with immutable images and serverless runtimes break the model. Application Control (allowlisting) does not contemplate AI-coding-assistant tool-use chains where the AI agent dynamically composes the executed action. |
84
+ | AU ASD ISM | ISM-1493 (vulnerability identification and patching) + ISM-1144 (patching frequency) + ISM-1808 (cloud service consumer responsibilities) | ISM-1808 acknowledges cloud shared-responsibility but does not specify exception language for provider-controlled runtimes. ISM-1493 / ISM-1144 patch-frequency controls assume operator-controlled patching. |
85
+ | AU APRA CPS 234 | Para 27 (information security capability) + Para 36 (control testing) | "Capability commensurate with vulnerabilities and threats" language. AI-pipeline and ZTA architectures are not enumerated as in-scope capability classes; an APRA-regulated entity must document the architectural deviation explicitly to avoid a control-testing finding. |
78
86
 
79
87
  This skill's exceptions exist precisely because the framework language has not caught up to the architecture. The exceptions do not claim the threat goes away — they document the compensating controls that handle the residual TTPs (see TTP Mapping).
80
88
 
@@ -18,8 +18,10 @@ triggers:
18
18
  - fips 204
19
19
  - fips 205
20
20
  data_deps:
21
- - cve-catalog.json
22
- - framework-control-gaps.json
21
+ - atlas-ttps.json
22
+ - exploit-availability.json
23
+ - global-frameworks.json
24
+ - rfc-references.json
23
25
  atlas_refs: []
24
26
  attack_refs: []
25
27
  framework_gaps:
@@ -12,6 +12,8 @@ triggers:
12
12
  - vector poisoning
13
13
  data_deps:
14
14
  - atlas-ttps.json
15
+ - d3fend-catalog.json
16
+ - exploit-availability.json
15
17
  - framework-control-gaps.json
16
18
  atlas_refs:
17
19
  - AML.T0020
@@ -26,12 +26,8 @@ triggers:
26
26
  - double extortion
27
27
  - data theft before encryption
28
28
  data_deps:
29
- - cve-catalog.json
30
- - atlas-ttps.json
31
- - framework-control-gaps.json
32
- - global-frameworks.json
33
- - cwe-catalog.json
34
29
  - d3fend-catalog.json
30
+ - framework-control-gaps.json
35
31
  - zeroday-lessons.json
36
32
  atlas_refs: []
37
33
  attack_refs:
@@ -14,12 +14,13 @@ triggers:
14
14
  - threat intel triage
15
15
  - exceptd research
16
16
  data_deps:
17
- - cve-catalog.json
18
17
  - atlas-ttps.json
19
- - framework-control-gaps.json
20
- - zeroday-lessons.json
18
+ - cve-catalog.json
19
+ - d3fend-catalog.json
21
20
  - exploit-availability.json
21
+ - framework-control-gaps.json
22
22
  - global-frameworks.json
23
+ - zeroday-lessons.json
23
24
  atlas_refs: []
24
25
  attack_refs: []
25
26
  framework_gaps: []
@@ -20,10 +20,6 @@ triggers:
20
20
  - smart meter security
21
21
  data_deps:
22
22
  - cve-catalog.json
23
- - atlas-ttps.json
24
- - framework-control-gaps.json
25
- - global-frameworks.json
26
- - cwe-catalog.json
27
23
  - d3fend-catalog.json
28
24
  atlas_refs: []
29
25
  attack_refs:
@@ -21,11 +21,10 @@ triggers:
21
21
  - stateramp
22
22
  data_deps:
23
23
  - cve-catalog.json
24
- - atlas-ttps.json
25
- - framework-control-gaps.json
26
- - global-frameworks.json
27
24
  - cwe-catalog.json
28
25
  - d3fend-catalog.json
26
+ - exploit-availability.json
27
+ - framework-control-gaps.json
29
28
  atlas_refs: []
30
29
  attack_refs:
31
30
  - T1190
@@ -22,12 +22,9 @@ triggers:
22
22
  - tlpt
23
23
  data_deps:
24
24
  - cve-catalog.json
25
- - atlas-ttps.json
26
- - framework-control-gaps.json
27
- - global-frameworks.json
28
- - cwe-catalog.json
29
25
  - d3fend-catalog.json
30
26
  - dlp-controls.json
27
+ - framework-control-gaps.json
31
28
  atlas_refs:
32
29
  - AML.T0096
33
30
  - AML.T0017
@@ -19,12 +19,7 @@ triggers:
19
19
  - patient data
20
20
  data_deps:
21
21
  - cve-catalog.json
22
- - atlas-ttps.json
23
- - framework-control-gaps.json
24
- - global-frameworks.json
25
- - cwe-catalog.json
26
22
  - d3fend-catalog.json
27
- - dlp-controls.json
28
23
  atlas_refs:
29
24
  - AML.T0051
30
25
  - AML.T0017
@@ -27,11 +27,7 @@ triggers:
27
27
  - itu-t x.805
28
28
  data_deps:
29
29
  - cve-catalog.json
30
- - atlas-ttps.json
31
30
  - framework-control-gaps.json
32
- - global-frameworks.json
33
- - cwe-catalog.json
34
- - d3fend-catalog.json
35
31
  atlas_refs:
36
32
  - AML.T0040
37
33
  attack_refs:
@@ -16,9 +16,8 @@ triggers:
16
16
  - defense in depth
17
17
  - how do we get from here to there
18
18
  data_deps:
19
+ - atlas-ttps.json
19
20
  - cve-catalog.json
20
- - framework-control-gaps.json
21
- - global-frameworks.json
22
21
  atlas_refs: []
23
22
  attack_refs: []
24
23
  framework_gaps: []
@@ -14,13 +14,14 @@ triggers:
14
14
  - atlas update
15
15
  - framework update
16
16
  data_deps:
17
- - cve-catalog.json
18
17
  - atlas-ttps.json
18
+ - cve-catalog.json
19
+ - d3fend-catalog.json
20
+ - exploit-availability.json
19
21
  - framework-control-gaps.json
20
22
  - global-frameworks.json
21
- - zeroday-lessons.json
22
- - exploit-availability.json
23
23
  - rfc-references.json
24
+ - zeroday-lessons.json
24
25
  atlas_refs: []
25
26
  attack_refs: []
26
27
  framework_gaps: []
@@ -19,11 +19,12 @@ triggers:
19
19
  - csaf
20
20
  data_deps:
21
21
  - cve-catalog.json
22
- - atlas-ttps.json
23
- - framework-control-gaps.json
24
- - rfc-references.json
25
22
  - cwe-catalog.json
26
23
  - d3fend-catalog.json
24
+ - exploit-availability.json
25
+ - framework-control-gaps.json
26
+ - global-frameworks.json
27
+ - rfc-references.json
27
28
  atlas_refs:
28
29
  - AML.T0010
29
30
  - AML.T0018
@@ -12,7 +12,7 @@ triggers:
12
12
  data_deps:
13
13
  - atlas-ttps.json
14
14
  - cve-catalog.json
15
- - framework-control-gaps.json
15
+ - global-frameworks.json
16
16
  atlas_refs: []
17
17
  attack_refs: []
18
18
  framework_gaps: []
@@ -18,10 +18,11 @@ triggers:
18
18
  - trust boundary
19
19
  data_deps:
20
20
  - atlas-ttps.json
21
- - framework-control-gaps.json
22
21
  - cve-catalog.json
23
22
  - cwe-catalog.json
24
23
  - d3fend-catalog.json
24
+ - framework-control-gaps.json
25
+ - zeroday-lessons.json
25
26
  atlas_refs: []
26
27
  attack_refs: []
27
28
  framework_gaps:
@@ -19,12 +19,7 @@ triggers:
19
19
  - broken access control
20
20
  - ai generated code
21
21
  data_deps:
22
- - cve-catalog.json
23
- - atlas-ttps.json
24
22
  - framework-control-gaps.json
25
- - cwe-catalog.json
26
- - d3fend-catalog.json
27
- - rfc-references.json
28
23
  atlas_refs:
29
24
  - AML.T0051
30
25
  attack_refs: