@blamejs/exceptd-skills 0.12.41 → 0.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (79) hide show
  1. package/CHANGELOG.md +91 -0
  2. package/bin/exceptd.js +52 -44
  3. package/data/_indexes/_meta.json +47 -47
  4. package/data/_indexes/chains.json +485 -13
  5. package/data/_indexes/jurisdiction-map.json +15 -4
  6. package/data/_indexes/section-offsets.json +1244 -1244
  7. package/data/_indexes/token-budget.json +173 -173
  8. package/data/atlas-ttps.json +54 -11
  9. package/data/attack-techniques.json +113 -17
  10. package/data/cve-catalog.json +17 -24
  11. package/data/cwe-catalog.json +8 -2
  12. package/data/framework-control-gaps.json +13 -3
  13. package/data/playbooks/ai-api.json +5 -0
  14. package/data/playbooks/cicd-pipeline-compromise.json +970 -0
  15. package/data/playbooks/cloud-iam-incident.json +4 -1
  16. package/data/playbooks/cred-stores.json +10 -0
  17. package/data/playbooks/framework.json +16 -0
  18. package/data/playbooks/hardening.json +4 -0
  19. package/data/playbooks/identity-sso-compromise.json +951 -0
  20. package/data/playbooks/idp-incident.json +3 -0
  21. package/data/playbooks/kernel.json +6 -0
  22. package/data/playbooks/llm-tool-use-exfil.json +963 -0
  23. package/data/playbooks/mcp.json +6 -0
  24. package/data/playbooks/runtime.json +4 -0
  25. package/data/playbooks/sbom.json +13 -0
  26. package/data/playbooks/secrets.json +6 -0
  27. package/data/playbooks/webhook-callback-abuse.json +916 -0
  28. package/lib/cross-ref-api.js +33 -13
  29. package/lib/cve-curation.js +12 -1
  30. package/lib/exit-codes.js +29 -0
  31. package/lib/lint-skills.js +24 -2
  32. package/lib/refresh-external.js +10 -1
  33. package/lib/scoring.js +55 -0
  34. package/manifest.json +83 -83
  35. package/orchestrator/index.js +32 -24
  36. package/package.json +1 -1
  37. package/sbom.cdx.json +122 -78
  38. package/scripts/predeploy.js +7 -13
  39. package/scripts/refresh-reverse-refs.js +86 -0
  40. package/scripts/refresh-sbom.js +21 -4
  41. package/skills/age-gates-child-safety/skill.md +1 -5
  42. package/skills/ai-attack-surface/skill.md +11 -4
  43. package/skills/ai-c2-detection/skill.md +11 -2
  44. package/skills/ai-risk-management/skill.md +4 -2
  45. package/skills/api-security/skill.md +7 -8
  46. package/skills/attack-surface-pentest/skill.md +2 -2
  47. package/skills/cloud-iam-incident/skill.md +1 -5
  48. package/skills/cloud-security/skill.md +0 -4
  49. package/skills/compliance-theater/skill.md +10 -2
  50. package/skills/container-runtime-security/skill.md +1 -3
  51. package/skills/dlp-gap-analysis/skill.md +3 -4
  52. package/skills/email-security-anti-phishing/skill.md +1 -8
  53. package/skills/exploit-scoring/skill.md +7 -2
  54. package/skills/framework-gap-analysis/skill.md +1 -1
  55. package/skills/fuzz-testing-strategy/skill.md +1 -2
  56. package/skills/global-grc/skill.md +3 -2
  57. package/skills/identity-assurance/skill.md +1 -3
  58. package/skills/idp-incident-response/skill.md +1 -4
  59. package/skills/incident-response-playbook/skill.md +1 -5
  60. package/skills/kernel-lpe-triage/skill.md +2 -2
  61. package/skills/mcp-agent-trust/skill.md +13 -3
  62. package/skills/mlops-security/skill.md +2 -3
  63. package/skills/ot-ics-security/skill.md +0 -3
  64. package/skills/policy-exception-gen/skill.md +11 -3
  65. package/skills/pqc-first/skill.md +4 -2
  66. package/skills/rag-pipeline-security/skill.md +2 -0
  67. package/skills/ransomware-response/skill.md +1 -5
  68. package/skills/researcher/skill.md +4 -3
  69. package/skills/sector-energy/skill.md +0 -4
  70. package/skills/sector-federal-government/skill.md +2 -3
  71. package/skills/sector-financial/skill.md +1 -4
  72. package/skills/sector-healthcare/skill.md +0 -5
  73. package/skills/sector-telecom/skill.md +0 -4
  74. package/skills/security-maturity-tiers/skill.md +1 -2
  75. package/skills/skill-update-loop/skill.md +4 -3
  76. package/skills/supply-chain-integrity/skill.md +4 -3
  77. package/skills/threat-model-currency/skill.md +1 -1
  78. package/skills/threat-modeling-methodology/skill.md +2 -1
  79. package/skills/webapp-security/skill.md +0 -5
@@ -20,12 +20,11 @@ triggers:
20
20
  - drift detection
21
21
  - model monitoring
22
22
  data_deps:
23
- - cve-catalog.json
24
23
  - atlas-ttps.json
25
- - framework-control-gaps.json
24
+ - cve-catalog.json
26
25
  - cwe-catalog.json
27
26
  - d3fend-catalog.json
28
- - rfc-references.json
27
+ - framework-control-gaps.json
29
28
  atlas_refs:
30
29
  - AML.T0010
31
30
  - AML.T0018
@@ -20,9 +20,6 @@ triggers:
20
20
  - purdue
21
21
  data_deps:
22
22
  - cve-catalog.json
23
- - atlas-ttps.json
24
- - framework-control-gaps.json
25
- - cwe-catalog.json
26
23
  - d3fend-catalog.json
27
24
  atlas_refs:
28
25
  - AML.T0010
@@ -12,8 +12,9 @@ triggers:
12
12
  - zero trust exception
13
13
  - compensating control
14
14
  data_deps:
15
- - framework-control-gaps.json
16
- - global-frameworks.json
15
+ - atlas-ttps.json
16
+ - cve-catalog.json
17
+ - exploit-availability.json
17
18
  atlas_refs: []
18
19
  attack_refs: []
19
20
  framework_gaps: []
@@ -22,7 +23,7 @@ forward_watch:
22
23
  - EU CRA exceptions for AI pipeline components
23
24
  - NIST SP 800-204 series updates for microservices
24
25
  - FedRAMP updates for container/serverless authorization
25
- last_threat_review: "2026-05-01"
26
+ last_threat_review: "2026-05-17"
26
27
  ---
27
28
 
28
29
  # Policy Exception Generation
@@ -75,6 +76,13 @@ Per-framework lag statements for each exception category in this skill:
75
76
  | PCI DSS 4.0 | 12.3.4 (Inventory of system components) | Persistent-asset assumption — fails for autoscaled ephemeral compute. |
76
77
  | PCI DSS 4.0 | 1.3 (Network segmentation) | Implicit perimeter-trust model; ZTA evidence shape does not match the language. |
77
78
  | NIS2 | Art. 21 (Cybersecurity risk-management measures) | Asset register and patch management language predates serverless; ephemeral nodes cannot be inventoried as the article assumes. |
79
+ | EU DORA | Art. 8 (ICT-related risk and ICT asset management) + Art. 9 (protection and prevention) + Art. 28 (ICT third-party risk) | Financial-entity asset register and patch-management obligations mirror the NIS2 lag: ephemeral compute has no clean register fit, and Art. 28 ICT third-party register is silent on LLM API providers and developer-environment MCP servers. ESAs RTS on subcontracting (JC 2024/53) does not enumerate AI/ML SaaS classes. |
80
+ | EU AI Act (Regulation 2024/1689) | Art. 13 (transparency / instructions for use) + Art. 15 (cybersecurity for high-risk AI) | Drafted around vendor-provided AI systems with documented change-management. External provider model updates that change behavior mid-deployment have no exception language; high-risk AI Art. 15 cybersecurity expectations assume operator control over the model. |
81
+ | UK NCSC CAF | Principle A2 (Risk Management), A4 (Supply Chain), B4 (System Security) | Outcome-based assessment. NCSC Cloud Security Principles and ZT Architecture Design Principles (NCSC 2024) recognize ephemeral and identity-centric architectures, but the CAF outcome statements do not enumerate ZTA / ephemeral / AI-model-update as explicit deviation classes. Exception language must map the operator's compensating-control bundle to the CAF principle's outcome rather than to a prescriptive control. |
82
+ | UK Cyber Essentials Plus | Patch management + Secure Configuration criteria | 14-day patch SLA assumes persistent assets the operator patches. Ephemeral / immutable / provider-patched runtimes (Lambda, Cloud Run, Cloudflare Workers) fall outside the criterion as written. The CE+ assessor expects a documented justification when a service does not fit the standard model. |
83
+ | AU ASD Essential 8 | Patch Applications + Patch Operating Systems + Application Control (ML1-ML3) | Patch-window language assumes a persistent OS / application installation the operator patches. Ephemeral container workloads with immutable images and serverless runtimes break the model. Application Control (allowlisting) does not contemplate AI-coding-assistant tool-use chains where the AI agent dynamically composes the executed action. |
84
+ | AU ASD ISM | ISM-1493 (vulnerability identification and patching) + ISM-1144 (patching frequency) + ISM-1808 (cloud service consumer responsibilities) | ISM-1808 acknowledges cloud shared-responsibility but does not specify exception language for provider-controlled runtimes. ISM-1493 / ISM-1144 patch-frequency controls assume operator-controlled patching. |
85
+ | AU APRA CPS 234 | Para 27 (information security capability) + Para 36 (control testing) | "Capability commensurate with vulnerabilities and threats" language. AI-pipeline and ZTA architectures are not enumerated as in-scope capability classes; an APRA-regulated entity must document the architectural deviation explicitly to avoid a control-testing finding. |
78
86
 
79
87
  This skill's exceptions exist precisely because the framework language has not caught up to the architecture. The exceptions do not claim the threat goes away — they document the compensating controls that handle the residual TTPs (see TTP Mapping).
80
88
 
@@ -18,8 +18,10 @@ triggers:
18
18
  - fips 204
19
19
  - fips 205
20
20
  data_deps:
21
- - cve-catalog.json
22
- - framework-control-gaps.json
21
+ - atlas-ttps.json
22
+ - exploit-availability.json
23
+ - global-frameworks.json
24
+ - rfc-references.json
23
25
  atlas_refs: []
24
26
  attack_refs: []
25
27
  framework_gaps:
@@ -12,6 +12,8 @@ triggers:
12
12
  - vector poisoning
13
13
  data_deps:
14
14
  - atlas-ttps.json
15
+ - d3fend-catalog.json
16
+ - exploit-availability.json
15
17
  - framework-control-gaps.json
16
18
  atlas_refs:
17
19
  - AML.T0020
@@ -26,12 +26,8 @@ triggers:
26
26
  - double extortion
27
27
  - data theft before encryption
28
28
  data_deps:
29
- - cve-catalog.json
30
- - atlas-ttps.json
31
- - framework-control-gaps.json
32
- - global-frameworks.json
33
- - cwe-catalog.json
34
29
  - d3fend-catalog.json
30
+ - framework-control-gaps.json
35
31
  - zeroday-lessons.json
36
32
  atlas_refs: []
37
33
  attack_refs:
@@ -14,12 +14,13 @@ triggers:
14
14
  - threat intel triage
15
15
  - exceptd research
16
16
  data_deps:
17
- - cve-catalog.json
18
17
  - atlas-ttps.json
19
- - framework-control-gaps.json
20
- - zeroday-lessons.json
18
+ - cve-catalog.json
19
+ - d3fend-catalog.json
21
20
  - exploit-availability.json
21
+ - framework-control-gaps.json
22
22
  - global-frameworks.json
23
+ - zeroday-lessons.json
23
24
  atlas_refs: []
24
25
  attack_refs: []
25
26
  framework_gaps: []
@@ -20,10 +20,6 @@ triggers:
20
20
  - smart meter security
21
21
  data_deps:
22
22
  - cve-catalog.json
23
- - atlas-ttps.json
24
- - framework-control-gaps.json
25
- - global-frameworks.json
26
- - cwe-catalog.json
27
23
  - d3fend-catalog.json
28
24
  atlas_refs: []
29
25
  attack_refs:
@@ -21,11 +21,10 @@ triggers:
21
21
  - stateramp
22
22
  data_deps:
23
23
  - cve-catalog.json
24
- - atlas-ttps.json
25
- - framework-control-gaps.json
26
- - global-frameworks.json
27
24
  - cwe-catalog.json
28
25
  - d3fend-catalog.json
26
+ - exploit-availability.json
27
+ - framework-control-gaps.json
29
28
  atlas_refs: []
30
29
  attack_refs:
31
30
  - T1190
@@ -22,12 +22,9 @@ triggers:
22
22
  - tlpt
23
23
  data_deps:
24
24
  - cve-catalog.json
25
- - atlas-ttps.json
26
- - framework-control-gaps.json
27
- - global-frameworks.json
28
- - cwe-catalog.json
29
25
  - d3fend-catalog.json
30
26
  - dlp-controls.json
27
+ - framework-control-gaps.json
31
28
  atlas_refs:
32
29
  - AML.T0096
33
30
  - AML.T0017
@@ -19,12 +19,7 @@ triggers:
19
19
  - patient data
20
20
  data_deps:
21
21
  - cve-catalog.json
22
- - atlas-ttps.json
23
- - framework-control-gaps.json
24
- - global-frameworks.json
25
- - cwe-catalog.json
26
22
  - d3fend-catalog.json
27
- - dlp-controls.json
28
23
  atlas_refs:
29
24
  - AML.T0051
30
25
  - AML.T0017
@@ -27,11 +27,7 @@ triggers:
27
27
  - itu-t x.805
28
28
  data_deps:
29
29
  - cve-catalog.json
30
- - atlas-ttps.json
31
30
  - framework-control-gaps.json
32
- - global-frameworks.json
33
- - cwe-catalog.json
34
- - d3fend-catalog.json
35
31
  atlas_refs:
36
32
  - AML.T0040
37
33
  attack_refs:
@@ -16,9 +16,8 @@ triggers:
16
16
  - defense in depth
17
17
  - how do we get from here to there
18
18
  data_deps:
19
+ - atlas-ttps.json
19
20
  - cve-catalog.json
20
- - framework-control-gaps.json
21
- - global-frameworks.json
22
21
  atlas_refs: []
23
22
  attack_refs: []
24
23
  framework_gaps: []
@@ -14,13 +14,14 @@ triggers:
14
14
  - atlas update
15
15
  - framework update
16
16
  data_deps:
17
- - cve-catalog.json
18
17
  - atlas-ttps.json
18
+ - cve-catalog.json
19
+ - d3fend-catalog.json
20
+ - exploit-availability.json
19
21
  - framework-control-gaps.json
20
22
  - global-frameworks.json
21
- - zeroday-lessons.json
22
- - exploit-availability.json
23
23
  - rfc-references.json
24
+ - zeroday-lessons.json
24
25
  atlas_refs: []
25
26
  attack_refs: []
26
27
  framework_gaps: []
@@ -19,11 +19,12 @@ triggers:
19
19
  - csaf
20
20
  data_deps:
21
21
  - cve-catalog.json
22
- - atlas-ttps.json
23
- - framework-control-gaps.json
24
- - rfc-references.json
25
22
  - cwe-catalog.json
26
23
  - d3fend-catalog.json
24
+ - exploit-availability.json
25
+ - framework-control-gaps.json
26
+ - global-frameworks.json
27
+ - rfc-references.json
27
28
  atlas_refs:
28
29
  - AML.T0010
29
30
  - AML.T0018
@@ -12,7 +12,7 @@ triggers:
12
12
  data_deps:
13
13
  - atlas-ttps.json
14
14
  - cve-catalog.json
15
- - framework-control-gaps.json
15
+ - global-frameworks.json
16
16
  atlas_refs: []
17
17
  attack_refs: []
18
18
  framework_gaps: []
@@ -18,10 +18,11 @@ triggers:
18
18
  - trust boundary
19
19
  data_deps:
20
20
  - atlas-ttps.json
21
- - framework-control-gaps.json
22
21
  - cve-catalog.json
23
22
  - cwe-catalog.json
24
23
  - d3fend-catalog.json
24
+ - framework-control-gaps.json
25
+ - zeroday-lessons.json
25
26
  atlas_refs: []
26
27
  attack_refs: []
27
28
  framework_gaps:
@@ -19,12 +19,7 @@ triggers:
19
19
  - broken access control
20
20
  - ai generated code
21
21
  data_deps:
22
- - cve-catalog.json
23
- - atlas-ttps.json
24
22
  - framework-control-gaps.json
25
- - cwe-catalog.json
26
- - d3fend-catalog.json
27
- - rfc-references.json
28
23
  atlas_refs:
29
24
  - AML.T0051
30
25
  attack_refs: