@blamejs/exceptd-skills 0.12.40 → 0.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +17 -0
- package/ARCHITECTURE.md +7 -4
- package/CHANGELOG.md +215 -248
- package/CONTEXT.md +2 -2
- package/README.md +2 -8
- package/agents/threat-researcher.md +2 -2
- package/bin/exceptd.js +179 -81
- package/data/_indexes/_meta.json +50 -50
- package/data/_indexes/activity-feed.json +1 -1
- package/data/_indexes/catalog-summaries.json +1 -1
- package/data/_indexes/chains.json +485 -13
- package/data/_indexes/frequency.json +4 -0
- package/data/_indexes/jurisdiction-map.json +15 -4
- package/data/_indexes/section-offsets.json +1224 -1224
- package/data/_indexes/token-budget.json +170 -170
- package/data/atlas-ttps.json +54 -11
- package/data/attack-techniques.json +113 -17
- package/data/cve-catalog.json +38 -52
- package/data/cwe-catalog.json +8 -2
- package/data/exploit-availability.json +1 -0
- package/data/framework-control-gaps.json +149 -6
- package/data/global-frameworks.json +1 -0
- package/data/playbooks/ai-api.json +5 -0
- package/data/playbooks/cicd-pipeline-compromise.json +970 -0
- package/data/playbooks/cloud-iam-incident.json +4 -1
- package/data/playbooks/cred-stores.json +10 -0
- package/data/playbooks/crypto-codebase.json +13 -0
- package/data/playbooks/framework.json +16 -0
- package/data/playbooks/hardening.json +4 -0
- package/data/playbooks/identity-sso-compromise.json +951 -0
- package/data/playbooks/idp-incident.json +3 -0
- package/data/playbooks/kernel.json +6 -0
- package/data/playbooks/llm-tool-use-exfil.json +963 -0
- package/data/playbooks/mcp.json +6 -0
- package/data/playbooks/runtime.json +4 -0
- package/data/playbooks/sbom.json +13 -0
- package/data/playbooks/secrets.json +6 -0
- package/data/playbooks/webhook-callback-abuse.json +916 -0
- package/data/zeroday-lessons.json +1 -0
- package/lib/cross-ref-api.js +33 -13
- package/lib/cve-curation.js +12 -1
- package/lib/exit-codes.js +29 -0
- package/lib/lint-skills.js +25 -3
- package/lib/playbook-runner.js +8 -4
- package/lib/refresh-external.js +10 -1
- package/lib/scoring.js +64 -1
- package/lib/sign.js +40 -7
- package/lib/verify.js +5 -5
- package/manifest.json +83 -83
- package/orchestrator/README.md +7 -7
- package/orchestrator/index.js +46 -25
- package/orchestrator/scheduler.js +2 -2
- package/package.json +1 -1
- package/sbom.cdx.json +135 -91
- package/scripts/check-test-coverage.js +6 -6
- package/scripts/predeploy.js +7 -13
- package/scripts/refresh-reverse-refs.js +107 -20
- package/scripts/refresh-sbom.js +21 -4
- package/skills/age-gates-child-safety/skill.md +1 -5
- package/skills/ai-attack-surface/skill.md +11 -4
- package/skills/ai-c2-detection/skill.md +11 -2
- package/skills/ai-risk-management/skill.md +4 -2
- package/skills/api-security/skill.md +7 -8
- package/skills/attack-surface-pentest/skill.md +2 -2
- package/skills/cloud-iam-incident/skill.md +1 -5
- package/skills/cloud-security/skill.md +0 -4
- package/skills/compliance-theater/skill.md +10 -2
- package/skills/container-runtime-security/skill.md +1 -3
- package/skills/dlp-gap-analysis/skill.md +3 -4
- package/skills/email-security-anti-phishing/skill.md +1 -8
- package/skills/exploit-scoring/skill.md +7 -2
- package/skills/framework-gap-analysis/skill.md +1 -1
- package/skills/fuzz-testing-strategy/skill.md +1 -2
- package/skills/global-grc/skill.md +3 -2
- package/skills/identity-assurance/skill.md +1 -3
- package/skills/idp-incident-response/skill.md +1 -4
- package/skills/incident-response-playbook/skill.md +1 -5
- package/skills/kernel-lpe-triage/skill.md +2 -2
- package/skills/mcp-agent-trust/skill.md +13 -3
- package/skills/mlops-security/skill.md +3 -4
- package/skills/ot-ics-security/skill.md +0 -3
- package/skills/policy-exception-gen/skill.md +11 -3
- package/skills/pqc-first/skill.md +4 -2
- package/skills/rag-pipeline-security/skill.md +2 -0
- package/skills/ransomware-response/skill.md +1 -5
- package/skills/researcher/skill.md +4 -3
- package/skills/sector-energy/skill.md +0 -4
- package/skills/sector-federal-government/skill.md +2 -3
- package/skills/sector-financial/skill.md +1 -4
- package/skills/sector-healthcare/skill.md +0 -5
- package/skills/sector-telecom/skill.md +0 -4
- package/skills/security-maturity-tiers/skill.md +1 -2
- package/skills/skill-update-loop/skill.md +4 -3
- package/skills/supply-chain-integrity/skill.md +4 -3
- package/skills/threat-model-currency/skill.md +1 -1
- package/skills/threat-modeling-methodology/skill.md +2 -1
- package/skills/webapp-security/skill.md +0 -5
|
@@ -17,9 +17,10 @@ triggers:
|
|
|
17
17
|
- multi-jurisdiction
|
|
18
18
|
- global compliance
|
|
19
19
|
data_deps:
|
|
20
|
-
- global-frameworks.json
|
|
21
|
-
- framework-control-gaps.json
|
|
22
20
|
- atlas-ttps.json
|
|
21
|
+
- exploit-availability.json
|
|
22
|
+
- framework-control-gaps.json
|
|
23
|
+
- global-frameworks.json
|
|
23
24
|
atlas_refs: []
|
|
24
25
|
attack_refs: []
|
|
25
26
|
framework_gaps: []
|
|
@@ -21,10 +21,8 @@ triggers:
|
|
|
21
21
|
- phishing-resistant
|
|
22
22
|
data_deps:
|
|
23
23
|
- cve-catalog.json
|
|
24
|
-
-
|
|
24
|
+
- exploit-availability.json
|
|
25
25
|
- framework-control-gaps.json
|
|
26
|
-
- cwe-catalog.json
|
|
27
|
-
- d3fend-catalog.json
|
|
28
26
|
- rfc-references.json
|
|
29
27
|
atlas_refs:
|
|
30
28
|
- AML.T0051
|
|
@@ -29,11 +29,8 @@ triggers:
|
|
|
29
29
|
- tenant compromise
|
|
30
30
|
data_deps:
|
|
31
31
|
- cve-catalog.json
|
|
32
|
-
- attack-techniques.json
|
|
33
|
-
- framework-control-gaps.json
|
|
34
|
-
- global-frameworks.json
|
|
35
|
-
- cwe-catalog.json
|
|
36
32
|
- d3fend-catalog.json
|
|
33
|
+
- framework-control-gaps.json
|
|
37
34
|
atlas_refs: []
|
|
38
35
|
attack_refs:
|
|
39
36
|
- T1078.004
|
|
@@ -17,12 +17,8 @@ triggers:
|
|
|
17
17
|
- prompt injection incident
|
|
18
18
|
- model exfiltration incident
|
|
19
19
|
data_deps:
|
|
20
|
-
- cve-catalog.json
|
|
21
|
-
- atlas-ttps.json
|
|
22
|
-
- framework-control-gaps.json
|
|
23
|
-
- global-frameworks.json
|
|
24
|
-
- cwe-catalog.json
|
|
25
20
|
- d3fend-catalog.json
|
|
21
|
+
- framework-control-gaps.json
|
|
26
22
|
- zeroday-lessons.json
|
|
27
23
|
atlas_refs:
|
|
28
24
|
- AML.T0096
|
|
@@ -14,9 +14,11 @@ triggers:
|
|
|
14
14
|
- claude code security
|
|
15
15
|
- ai agent security
|
|
16
16
|
data_deps:
|
|
17
|
-
- cve-catalog.json
|
|
18
17
|
- atlas-ttps.json
|
|
19
|
-
-
|
|
18
|
+
- cve-catalog.json
|
|
19
|
+
- d3fend-catalog.json
|
|
20
|
+
- exploit-availability.json
|
|
21
|
+
- rfc-references.json
|
|
20
22
|
atlas_refs:
|
|
21
23
|
- AML.T0010
|
|
22
24
|
- AML.T0016
|
|
@@ -65,7 +67,7 @@ forward_watch:
|
|
|
65
67
|
- Pwn2Own Berlin 2026 (disclosed 2026-05-14, embargo ends 2026-08-12) — LiteLLM full SSRF + Code Injection by Out Of Bounds (Byung Young Yi); duplicate-class with the k3vg3n entry; track unified patch advisory
|
|
66
68
|
- Pwn2Own Berlin 2026 (disclosed 2026-05-14, embargo ends 2026-08-12) — LM Studio 5-bug exploit chain by STARLabs SG; impacts local MCP/agent runtime trust; track patch and integration advisories
|
|
67
69
|
- Pwn2Own Berlin 2026 (disclosed 2026-05-14, embargo ends 2026-08-12) — Claude Code MCP collision-scored entry by Viettel Cyber Security; CVE in flight; track MCP trust and tool-collision advisory
|
|
68
|
-
last_threat_review: "2026-05-
|
|
70
|
+
last_threat_review: "2026-05-17"
|
|
69
71
|
---
|
|
70
72
|
|
|
71
73
|
# MCP Agent Trust Assessment
|
|
@@ -142,6 +144,14 @@ Every MCP server listed in popular registries (MCP Hub, npm `@modelcontextprotoc
|
|
|
142
144
|
| CIS Controls v8 | Control 2 (Inventory and Control of Software Assets) | Software inventory and allowlisting. Does not explicitly cover MCP servers. AI coding assistant MCP configs are not in scope for most enterprise software inventory processes. |
|
|
143
145
|
| PCI DSS 4.0 | 12.3.4 | Review and manage third-party service providers. Scoped to service providers with access to cardholder data. An MCP server running on a developer workstation accessing a PCI-scoped codebase is not clearly in scope and would not appear in vendor management reviews. |
|
|
144
146
|
| SWIFT CSCF v2026 | 1.1 (SWIFT Environment Protection — allowlisted software inside the secure zone) | Mandates allowlisted software and protected operator-PC posture for the SWIFT secure zone. The control's allowlist concept is the closest existing analogue to MCP tool allowlisting, but CSCF 1.1 was written for traditional middleware and does not contemplate MCP servers, agent-mediated tool calls, or model-judgment-as-authorization on operator workstations adjacent to the SWIFT zone. |
|
|
147
|
+
| EU NIS2 | Art. 21(2)(d) (supply-chain security) + Art. 21(2)(e) (security in acquisition, development and maintenance) | "Appropriate and proportionate" supply-chain language. Member-state transpositions (BSI IT-SiG 2.0, ANSSI, CNIL) do not enumerate MCP servers as in-scope third-party components. An essential entity meets the NIS2 supplier-management obligation with traditional SaaS vendor reviews while leaving developer-workstation MCP servers entirely outside the supply-chain register. |
|
|
148
|
+
| EU DORA | Art. 28 (ICT third-party risk register) + Art. 30 (key contractual provisions) + Art. 6 (ICT risk-management framework) | Financial-entity ICT third-party language scoped to traditional ICT providers and cloud outsourcing. ESAs RTS on subcontracting (JC 2024/53) is silent on MCP servers running inside trading-desk developer environments, even though those MCP servers can reach repository, trading-system, and ticketing-system tools via the AI assistant. |
|
|
149
|
+
| EU AI Act (Regulation 2024/1689) | Art. 9 (risk management for high-risk AI) + Art. 15 (cybersecurity) + Art. 25 (responsibilities along the AI value chain) | Art. 25 addresses providers, deployers, importers, and distributors but does not categorize MCP server publishers as in-scope value-chain actors. High-risk AI cybersecurity language refers to "state of the art" without naming MCP supply chain as a scoped attack class. |
|
|
150
|
+
| UK NCSC CAF | Principle A4 (Supply Chain), B4 (System Security), B2 (Identity and Access Control) | Outcome-based language. NCSC's 2024 guidance on securing AI systems names supply-chain integrity for AI tooling, but the CAF outcome statements are unchanged — an organisation can achieve A4 / B4 outcomes at Achieved level with zero MCP server allowlisting, no signature verification, and no per-server authentication. |
|
|
151
|
+
| UK DSIT AI Cyber Code of Practice (2025) | Principle 7 (secure software supply chain) + Principle 8 (secure development) | Names supply-chain integrity for AI development but as a principle, not a testable control. No technical floor for MCP signing, allowlisting, or per-server auth. |
|
|
152
|
+
| AU ASD Essential 8 | Strategy: Application Control + Restrict Administrative Privileges | Application Control (allowlisting) is the closest existing strategy to MCP allowlisting but is scoped to operating-system-level executables. MCP servers run as long-lived child processes spawned by the AI assistant's process — Application Control rarely reaches the npm/pip-installed JavaScript or Python that constitutes an MCP server. None of the eight strategies address agent-mediated tool execution. |
|
|
153
|
+
| AU ASD ISM | ISM-1728 (managing cyber supply chain risk) + ISM-1808 (cloud consumer responsibilities) + ISM-0935 (application control) | ISM-1728 supply-chain language is scoped to traditional vendor classes; MCP servers fall outside enumerated supply-chain categories. ISM-0935 application control is operating-system-level and does not reach package-level MCP servers. |
|
|
154
|
+
| AU APRA CPS 234 / CPS 230 | Para 27 (information security capability) + CPS 230 ICT-service-provider obligations | "Capability commensurate with vulnerabilities and threats" language. APRA-regulated entities deploying AI coding assistants meet CPS 234 attestation with traditional vendor-management capability; MCP-specific supply-chain capability is not an examined control. CPS 230 (effective 2025-07-01) third-party-arrangements obligations do not enumerate MCP servers as in-scope material service providers. |
|
|
145
155
|
|
|
146
156
|
**Fundamental gap:** No current framework has a control category for "AI tool trust boundaries" — the concept that an AI model can be the authorization mechanism for code execution, and that this creates a new class of supply chain and access control risk.
|
|
147
157
|
|
|
@@ -20,12 +20,11 @@ triggers:
|
|
|
20
20
|
- drift detection
|
|
21
21
|
- model monitoring
|
|
22
22
|
data_deps:
|
|
23
|
-
- cve-catalog.json
|
|
24
23
|
- atlas-ttps.json
|
|
25
|
-
-
|
|
24
|
+
- cve-catalog.json
|
|
26
25
|
- cwe-catalog.json
|
|
27
26
|
- d3fend-catalog.json
|
|
28
|
-
-
|
|
27
|
+
- framework-control-gaps.json
|
|
29
28
|
atlas_refs:
|
|
30
29
|
- AML.T0010
|
|
31
30
|
- AML.T0018
|
|
@@ -61,7 +60,7 @@ forward_watch:
|
|
|
61
60
|
- OpenSSF model-signing emergence to v1.0 — Sigstore-based model-weight signing; track for production adoption and admission-control integration
|
|
62
61
|
- SLSA v1.1 ML profile (draft) — model-provenance extension for training-run attestation chains; track ID and section changes
|
|
63
62
|
- EU AI Act high-risk technical-file implementing acts (2026-2027) — operational requirements for Article 10 / 13 / 15 documentation may pin ML-BOM or model-signing
|
|
64
|
-
- MITRE ATLAS v5.4.0 (released February 2026) shipped the AML.T0010 sub-technique expansion this forecast tracked plus new techniques ("Publish Poisoned AI Agent Tool", "Escape to Host"); inventory now 16 tactics, 84 techniques, 56 sub-techniques. Forward watch: ATLAS
|
|
63
|
+
- MITRE ATLAS v5.4.0 (released February 2026) shipped the AML.T0010 sub-technique expansion this forecast tracked plus new techniques ("Publish Poisoned AI Agent Tool", "Escape to Host"); inventory now 16 tactics, 84 techniques, 56 sub-techniques. Forward watch: subsequent ATLAS minor and major releases — track next-cadence updates to agentic-AI TTPs and MLOps-pipeline-specific techniques
|
|
65
64
|
last_threat_review: "2026-05-15"
|
|
66
65
|
---
|
|
67
66
|
|
|
@@ -12,8 +12,9 @@ triggers:
|
|
|
12
12
|
- zero trust exception
|
|
13
13
|
- compensating control
|
|
14
14
|
data_deps:
|
|
15
|
-
-
|
|
16
|
-
-
|
|
15
|
+
- atlas-ttps.json
|
|
16
|
+
- cve-catalog.json
|
|
17
|
+
- exploit-availability.json
|
|
17
18
|
atlas_refs: []
|
|
18
19
|
attack_refs: []
|
|
19
20
|
framework_gaps: []
|
|
@@ -22,7 +23,7 @@ forward_watch:
|
|
|
22
23
|
- EU CRA exceptions for AI pipeline components
|
|
23
24
|
- NIST SP 800-204 series updates for microservices
|
|
24
25
|
- FedRAMP updates for container/serverless authorization
|
|
25
|
-
last_threat_review: "2026-05-
|
|
26
|
+
last_threat_review: "2026-05-17"
|
|
26
27
|
---
|
|
27
28
|
|
|
28
29
|
# Policy Exception Generation
|
|
@@ -75,6 +76,13 @@ Per-framework lag statements for each exception category in this skill:
|
|
|
75
76
|
| PCI DSS 4.0 | 12.3.4 (Inventory of system components) | Persistent-asset assumption — fails for autoscaled ephemeral compute. |
|
|
76
77
|
| PCI DSS 4.0 | 1.3 (Network segmentation) | Implicit perimeter-trust model; ZTA evidence shape does not match the language. |
|
|
77
78
|
| NIS2 | Art. 21 (Cybersecurity risk-management measures) | Asset register and patch management language predates serverless; ephemeral nodes cannot be inventoried as the article assumes. |
|
|
79
|
+
| EU DORA | Art. 8 (ICT-related risk and ICT asset management) + Art. 9 (protection and prevention) + Art. 28 (ICT third-party risk) | Financial-entity asset register and patch-management obligations mirror the NIS2 lag: ephemeral compute has no clean register fit, and Art. 28 ICT third-party register is silent on LLM API providers and developer-environment MCP servers. ESAs RTS on subcontracting (JC 2024/53) does not enumerate AI/ML SaaS classes. |
|
|
80
|
+
| EU AI Act (Regulation 2024/1689) | Art. 13 (transparency / instructions for use) + Art. 15 (cybersecurity for high-risk AI) | Drafted around vendor-provided AI systems with documented change-management. External provider model updates that change behavior mid-deployment have no exception language; high-risk AI Art. 15 cybersecurity expectations assume operator control over the model. |
|
|
81
|
+
| UK NCSC CAF | Principle A2 (Risk Management), A4 (Supply Chain), B4 (System Security) | Outcome-based assessment. NCSC Cloud Security Principles and ZT Architecture Design Principles (NCSC 2024) recognize ephemeral and identity-centric architectures, but the CAF outcome statements do not enumerate ZTA / ephemeral / AI-model-update as explicit deviation classes. Exception language must map the operator's compensating-control bundle to the CAF principle's outcome rather than to a prescriptive control. |
|
|
82
|
+
| UK Cyber Essentials Plus | Patch management + Secure Configuration criteria | 14-day patch SLA assumes persistent assets the operator patches. Ephemeral / immutable / provider-patched runtimes (Lambda, Cloud Run, Cloudflare Workers) fall outside the criterion as written. The CE+ assessor expects a documented justification when a service does not fit the standard model. |
|
|
83
|
+
| AU ASD Essential 8 | Patch Applications + Patch Operating Systems + Application Control (ML1-ML3) | Patch-window language assumes a persistent OS / application installation the operator patches. Ephemeral container workloads with immutable images and serverless runtimes break the model. Application Control (allowlisting) does not contemplate AI-coding-assistant tool-use chains where the AI agent dynamically composes the executed action. |
|
|
84
|
+
| AU ASD ISM | ISM-1493 (vulnerability identification and patching) + ISM-1144 (patching frequency) + ISM-1808 (cloud service consumer responsibilities) | ISM-1808 acknowledges cloud shared-responsibility but does not specify exception language for provider-controlled runtimes. ISM-1493 / ISM-1144 patch-frequency controls assume operator-controlled patching. |
|
|
85
|
+
| AU APRA CPS 234 | Para 27 (information security capability) + Para 36 (control testing) | "Capability commensurate with vulnerabilities and threats" language. AI-pipeline and ZTA architectures are not enumerated as in-scope capability classes; an APRA-regulated entity must document the architectural deviation explicitly to avoid a control-testing finding. |
|
|
78
86
|
|
|
79
87
|
This skill's exceptions exist precisely because the framework language has not caught up to the architecture. The exceptions do not claim the threat goes away — they document the compensating controls that handle the residual TTPs (see TTP Mapping).
|
|
80
88
|
|
|
@@ -18,8 +18,10 @@ triggers:
|
|
|
18
18
|
- fips 204
|
|
19
19
|
- fips 205
|
|
20
20
|
data_deps:
|
|
21
|
-
-
|
|
22
|
-
-
|
|
21
|
+
- atlas-ttps.json
|
|
22
|
+
- exploit-availability.json
|
|
23
|
+
- global-frameworks.json
|
|
24
|
+
- rfc-references.json
|
|
23
25
|
atlas_refs: []
|
|
24
26
|
attack_refs: []
|
|
25
27
|
framework_gaps:
|
|
@@ -26,12 +26,8 @@ triggers:
|
|
|
26
26
|
- double extortion
|
|
27
27
|
- data theft before encryption
|
|
28
28
|
data_deps:
|
|
29
|
-
- cve-catalog.json
|
|
30
|
-
- atlas-ttps.json
|
|
31
|
-
- framework-control-gaps.json
|
|
32
|
-
- global-frameworks.json
|
|
33
|
-
- cwe-catalog.json
|
|
34
29
|
- d3fend-catalog.json
|
|
30
|
+
- framework-control-gaps.json
|
|
35
31
|
- zeroday-lessons.json
|
|
36
32
|
atlas_refs: []
|
|
37
33
|
attack_refs:
|
|
@@ -14,12 +14,13 @@ triggers:
|
|
|
14
14
|
- threat intel triage
|
|
15
15
|
- exceptd research
|
|
16
16
|
data_deps:
|
|
17
|
-
- cve-catalog.json
|
|
18
17
|
- atlas-ttps.json
|
|
19
|
-
-
|
|
20
|
-
-
|
|
18
|
+
- cve-catalog.json
|
|
19
|
+
- d3fend-catalog.json
|
|
21
20
|
- exploit-availability.json
|
|
21
|
+
- framework-control-gaps.json
|
|
22
22
|
- global-frameworks.json
|
|
23
|
+
- zeroday-lessons.json
|
|
23
24
|
atlas_refs: []
|
|
24
25
|
attack_refs: []
|
|
25
26
|
framework_gaps: []
|
|
@@ -21,11 +21,10 @@ triggers:
|
|
|
21
21
|
- stateramp
|
|
22
22
|
data_deps:
|
|
23
23
|
- cve-catalog.json
|
|
24
|
-
- atlas-ttps.json
|
|
25
|
-
- framework-control-gaps.json
|
|
26
|
-
- global-frameworks.json
|
|
27
24
|
- cwe-catalog.json
|
|
28
25
|
- d3fend-catalog.json
|
|
26
|
+
- exploit-availability.json
|
|
27
|
+
- framework-control-gaps.json
|
|
29
28
|
atlas_refs: []
|
|
30
29
|
attack_refs:
|
|
31
30
|
- T1190
|
|
@@ -22,12 +22,9 @@ triggers:
|
|
|
22
22
|
- tlpt
|
|
23
23
|
data_deps:
|
|
24
24
|
- cve-catalog.json
|
|
25
|
-
- atlas-ttps.json
|
|
26
|
-
- framework-control-gaps.json
|
|
27
|
-
- global-frameworks.json
|
|
28
|
-
- cwe-catalog.json
|
|
29
25
|
- d3fend-catalog.json
|
|
30
26
|
- dlp-controls.json
|
|
27
|
+
- framework-control-gaps.json
|
|
31
28
|
atlas_refs:
|
|
32
29
|
- AML.T0096
|
|
33
30
|
- AML.T0017
|
|
@@ -19,12 +19,7 @@ triggers:
|
|
|
19
19
|
- patient data
|
|
20
20
|
data_deps:
|
|
21
21
|
- cve-catalog.json
|
|
22
|
-
- atlas-ttps.json
|
|
23
|
-
- framework-control-gaps.json
|
|
24
|
-
- global-frameworks.json
|
|
25
|
-
- cwe-catalog.json
|
|
26
22
|
- d3fend-catalog.json
|
|
27
|
-
- dlp-controls.json
|
|
28
23
|
atlas_refs:
|
|
29
24
|
- AML.T0051
|
|
30
25
|
- AML.T0017
|
|
@@ -14,13 +14,14 @@ triggers:
|
|
|
14
14
|
- atlas update
|
|
15
15
|
- framework update
|
|
16
16
|
data_deps:
|
|
17
|
-
- cve-catalog.json
|
|
18
17
|
- atlas-ttps.json
|
|
18
|
+
- cve-catalog.json
|
|
19
|
+
- d3fend-catalog.json
|
|
20
|
+
- exploit-availability.json
|
|
19
21
|
- framework-control-gaps.json
|
|
20
22
|
- global-frameworks.json
|
|
21
|
-
- zeroday-lessons.json
|
|
22
|
-
- exploit-availability.json
|
|
23
23
|
- rfc-references.json
|
|
24
|
+
- zeroday-lessons.json
|
|
24
25
|
atlas_refs: []
|
|
25
26
|
attack_refs: []
|
|
26
27
|
framework_gaps: []
|
|
@@ -19,11 +19,12 @@ triggers:
|
|
|
19
19
|
- csaf
|
|
20
20
|
data_deps:
|
|
21
21
|
- cve-catalog.json
|
|
22
|
-
- atlas-ttps.json
|
|
23
|
-
- framework-control-gaps.json
|
|
24
|
-
- rfc-references.json
|
|
25
22
|
- cwe-catalog.json
|
|
26
23
|
- d3fend-catalog.json
|
|
24
|
+
- exploit-availability.json
|
|
25
|
+
- framework-control-gaps.json
|
|
26
|
+
- global-frameworks.json
|
|
27
|
+
- rfc-references.json
|
|
27
28
|
atlas_refs:
|
|
28
29
|
- AML.T0010
|
|
29
30
|
- AML.T0018
|
|
@@ -18,10 +18,11 @@ triggers:
|
|
|
18
18
|
- trust boundary
|
|
19
19
|
data_deps:
|
|
20
20
|
- atlas-ttps.json
|
|
21
|
-
- framework-control-gaps.json
|
|
22
21
|
- cve-catalog.json
|
|
23
22
|
- cwe-catalog.json
|
|
24
23
|
- d3fend-catalog.json
|
|
24
|
+
- framework-control-gaps.json
|
|
25
|
+
- zeroday-lessons.json
|
|
25
26
|
atlas_refs: []
|
|
26
27
|
attack_refs: []
|
|
27
28
|
framework_gaps:
|
|
@@ -19,12 +19,7 @@ triggers:
|
|
|
19
19
|
- broken access control
|
|
20
20
|
- ai generated code
|
|
21
21
|
data_deps:
|
|
22
|
-
- cve-catalog.json
|
|
23
|
-
- atlas-ttps.json
|
|
24
22
|
- framework-control-gaps.json
|
|
25
|
-
- cwe-catalog.json
|
|
26
|
-
- d3fend-catalog.json
|
|
27
|
-
- rfc-references.json
|
|
28
23
|
atlas_refs:
|
|
29
24
|
- AML.T0051
|
|
30
25
|
attack_refs:
|