@blamejs/exceptd-skills 0.12.41 → 0.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +91 -0
- package/bin/exceptd.js +52 -44
- package/data/_indexes/_meta.json +47 -47
- package/data/_indexes/chains.json +485 -13
- package/data/_indexes/jurisdiction-map.json +15 -4
- package/data/_indexes/section-offsets.json +1244 -1244
- package/data/_indexes/token-budget.json +173 -173
- package/data/atlas-ttps.json +54 -11
- package/data/attack-techniques.json +113 -17
- package/data/cve-catalog.json +17 -24
- package/data/cwe-catalog.json +8 -2
- package/data/framework-control-gaps.json +13 -3
- package/data/playbooks/ai-api.json +5 -0
- package/data/playbooks/cicd-pipeline-compromise.json +970 -0
- package/data/playbooks/cloud-iam-incident.json +4 -1
- package/data/playbooks/cred-stores.json +10 -0
- package/data/playbooks/framework.json +16 -0
- package/data/playbooks/hardening.json +4 -0
- package/data/playbooks/identity-sso-compromise.json +951 -0
- package/data/playbooks/idp-incident.json +3 -0
- package/data/playbooks/kernel.json +6 -0
- package/data/playbooks/llm-tool-use-exfil.json +963 -0
- package/data/playbooks/mcp.json +6 -0
- package/data/playbooks/runtime.json +4 -0
- package/data/playbooks/sbom.json +13 -0
- package/data/playbooks/secrets.json +6 -0
- package/data/playbooks/webhook-callback-abuse.json +916 -0
- package/lib/cross-ref-api.js +33 -13
- package/lib/cve-curation.js +12 -1
- package/lib/exit-codes.js +29 -0
- package/lib/lint-skills.js +24 -2
- package/lib/refresh-external.js +10 -1
- package/lib/scoring.js +55 -0
- package/manifest.json +83 -83
- package/orchestrator/index.js +32 -24
- package/package.json +1 -1
- package/sbom.cdx.json +122 -78
- package/scripts/predeploy.js +7 -13
- package/scripts/refresh-reverse-refs.js +86 -0
- package/scripts/refresh-sbom.js +21 -4
- package/skills/age-gates-child-safety/skill.md +1 -5
- package/skills/ai-attack-surface/skill.md +11 -4
- package/skills/ai-c2-detection/skill.md +11 -2
- package/skills/ai-risk-management/skill.md +4 -2
- package/skills/api-security/skill.md +7 -8
- package/skills/attack-surface-pentest/skill.md +2 -2
- package/skills/cloud-iam-incident/skill.md +1 -5
- package/skills/cloud-security/skill.md +0 -4
- package/skills/compliance-theater/skill.md +10 -2
- package/skills/container-runtime-security/skill.md +1 -3
- package/skills/dlp-gap-analysis/skill.md +3 -4
- package/skills/email-security-anti-phishing/skill.md +1 -8
- package/skills/exploit-scoring/skill.md +7 -2
- package/skills/framework-gap-analysis/skill.md +1 -1
- package/skills/fuzz-testing-strategy/skill.md +1 -2
- package/skills/global-grc/skill.md +3 -2
- package/skills/identity-assurance/skill.md +1 -3
- package/skills/idp-incident-response/skill.md +1 -4
- package/skills/incident-response-playbook/skill.md +1 -5
- package/skills/kernel-lpe-triage/skill.md +2 -2
- package/skills/mcp-agent-trust/skill.md +13 -3
- package/skills/mlops-security/skill.md +2 -3
- package/skills/ot-ics-security/skill.md +0 -3
- package/skills/policy-exception-gen/skill.md +11 -3
- package/skills/pqc-first/skill.md +4 -2
- package/skills/rag-pipeline-security/skill.md +2 -0
- package/skills/ransomware-response/skill.md +1 -5
- package/skills/researcher/skill.md +4 -3
- package/skills/sector-energy/skill.md +0 -4
- package/skills/sector-federal-government/skill.md +2 -3
- package/skills/sector-financial/skill.md +1 -4
- package/skills/sector-healthcare/skill.md +0 -5
- package/skills/sector-telecom/skill.md +0 -4
- package/skills/security-maturity-tiers/skill.md +1 -2
- package/skills/skill-update-loop/skill.md +4 -3
- package/skills/supply-chain-integrity/skill.md +4 -3
- package/skills/threat-model-currency/skill.md +1 -1
- package/skills/threat-modeling-methodology/skill.md +2 -1
- package/skills/webapp-security/skill.md +0 -5
|
@@ -20,12 +20,11 @@ triggers:
|
|
|
20
20
|
- drift detection
|
|
21
21
|
- model monitoring
|
|
22
22
|
data_deps:
|
|
23
|
-
- cve-catalog.json
|
|
24
23
|
- atlas-ttps.json
|
|
25
|
-
-
|
|
24
|
+
- cve-catalog.json
|
|
26
25
|
- cwe-catalog.json
|
|
27
26
|
- d3fend-catalog.json
|
|
28
|
-
-
|
|
27
|
+
- framework-control-gaps.json
|
|
29
28
|
atlas_refs:
|
|
30
29
|
- AML.T0010
|
|
31
30
|
- AML.T0018
|
|
@@ -12,8 +12,9 @@ triggers:
|
|
|
12
12
|
- zero trust exception
|
|
13
13
|
- compensating control
|
|
14
14
|
data_deps:
|
|
15
|
-
-
|
|
16
|
-
-
|
|
15
|
+
- atlas-ttps.json
|
|
16
|
+
- cve-catalog.json
|
|
17
|
+
- exploit-availability.json
|
|
17
18
|
atlas_refs: []
|
|
18
19
|
attack_refs: []
|
|
19
20
|
framework_gaps: []
|
|
@@ -22,7 +23,7 @@ forward_watch:
|
|
|
22
23
|
- EU CRA exceptions for AI pipeline components
|
|
23
24
|
- NIST SP 800-204 series updates for microservices
|
|
24
25
|
- FedRAMP updates for container/serverless authorization
|
|
25
|
-
last_threat_review: "2026-05-
|
|
26
|
+
last_threat_review: "2026-05-17"
|
|
26
27
|
---
|
|
27
28
|
|
|
28
29
|
# Policy Exception Generation
|
|
@@ -75,6 +76,13 @@ Per-framework lag statements for each exception category in this skill:
|
|
|
75
76
|
| PCI DSS 4.0 | 12.3.4 (Inventory of system components) | Persistent-asset assumption — fails for autoscaled ephemeral compute. |
|
|
76
77
|
| PCI DSS 4.0 | 1.3 (Network segmentation) | Implicit perimeter-trust model; ZTA evidence shape does not match the language. |
|
|
77
78
|
| NIS2 | Art. 21 (Cybersecurity risk-management measures) | Asset register and patch management language predates serverless; ephemeral nodes cannot be inventoried as the article assumes. |
|
|
79
|
+
| EU DORA | Art. 8 (ICT-related risk and ICT asset management) + Art. 9 (protection and prevention) + Art. 28 (ICT third-party risk) | Financial-entity asset register and patch-management obligations mirror the NIS2 lag: ephemeral compute has no clean register fit, and Art. 28 ICT third-party register is silent on LLM API providers and developer-environment MCP servers. ESAs RTS on subcontracting (JC 2024/53) does not enumerate AI/ML SaaS classes. |
|
|
80
|
+
| EU AI Act (Regulation 2024/1689) | Art. 13 (transparency / instructions for use) + Art. 15 (cybersecurity for high-risk AI) | Drafted around vendor-provided AI systems with documented change-management. External provider model updates that change behavior mid-deployment have no exception language; high-risk AI Art. 15 cybersecurity expectations assume operator control over the model. |
|
|
81
|
+
| UK NCSC CAF | Principle A2 (Risk Management), A4 (Supply Chain), B4 (System Security) | Outcome-based assessment. NCSC Cloud Security Principles and ZT Architecture Design Principles (NCSC 2024) recognize ephemeral and identity-centric architectures, but the CAF outcome statements do not enumerate ZTA / ephemeral / AI-model-update as explicit deviation classes. Exception language must map the operator's compensating-control bundle to the CAF principle's outcome rather than to a prescriptive control. |
|
|
82
|
+
| UK Cyber Essentials Plus | Patch management + Secure Configuration criteria | 14-day patch SLA assumes persistent assets the operator patches. Ephemeral / immutable / provider-patched runtimes (Lambda, Cloud Run, Cloudflare Workers) fall outside the criterion as written. The CE+ assessor expects a documented justification when a service does not fit the standard model. |
|
|
83
|
+
| AU ASD Essential 8 | Patch Applications + Patch Operating Systems + Application Control (ML1-ML3) | Patch-window language assumes a persistent OS / application installation the operator patches. Ephemeral container workloads with immutable images and serverless runtimes break the model. Application Control (allowlisting) does not contemplate AI-coding-assistant tool-use chains where the AI agent dynamically composes the executed action. |
|
|
84
|
+
| AU ASD ISM | ISM-1493 (vulnerability identification and patching) + ISM-1144 (patching frequency) + ISM-1808 (cloud service consumer responsibilities) | ISM-1808 acknowledges cloud shared-responsibility but does not specify exception language for provider-controlled runtimes. ISM-1493 / ISM-1144 patch-frequency controls assume operator-controlled patching. |
|
|
85
|
+
| AU APRA CPS 234 | Para 27 (information security capability) + Para 36 (control testing) | "Capability commensurate with vulnerabilities and threats" language. AI-pipeline and ZTA architectures are not enumerated as in-scope capability classes; an APRA-regulated entity must document the architectural deviation explicitly to avoid a control-testing finding. |
|
|
78
86
|
|
|
79
87
|
This skill's exceptions exist precisely because the framework language has not caught up to the architecture. The exceptions do not claim the threat goes away — they document the compensating controls that handle the residual TTPs (see TTP Mapping).
|
|
80
88
|
|
|
@@ -18,8 +18,10 @@ triggers:
|
|
|
18
18
|
- fips 204
|
|
19
19
|
- fips 205
|
|
20
20
|
data_deps:
|
|
21
|
-
-
|
|
22
|
-
-
|
|
21
|
+
- atlas-ttps.json
|
|
22
|
+
- exploit-availability.json
|
|
23
|
+
- global-frameworks.json
|
|
24
|
+
- rfc-references.json
|
|
23
25
|
atlas_refs: []
|
|
24
26
|
attack_refs: []
|
|
25
27
|
framework_gaps:
|
|
@@ -26,12 +26,8 @@ triggers:
|
|
|
26
26
|
- double extortion
|
|
27
27
|
- data theft before encryption
|
|
28
28
|
data_deps:
|
|
29
|
-
- cve-catalog.json
|
|
30
|
-
- atlas-ttps.json
|
|
31
|
-
- framework-control-gaps.json
|
|
32
|
-
- global-frameworks.json
|
|
33
|
-
- cwe-catalog.json
|
|
34
29
|
- d3fend-catalog.json
|
|
30
|
+
- framework-control-gaps.json
|
|
35
31
|
- zeroday-lessons.json
|
|
36
32
|
atlas_refs: []
|
|
37
33
|
attack_refs:
|
|
@@ -14,12 +14,13 @@ triggers:
|
|
|
14
14
|
- threat intel triage
|
|
15
15
|
- exceptd research
|
|
16
16
|
data_deps:
|
|
17
|
-
- cve-catalog.json
|
|
18
17
|
- atlas-ttps.json
|
|
19
|
-
-
|
|
20
|
-
-
|
|
18
|
+
- cve-catalog.json
|
|
19
|
+
- d3fend-catalog.json
|
|
21
20
|
- exploit-availability.json
|
|
21
|
+
- framework-control-gaps.json
|
|
22
22
|
- global-frameworks.json
|
|
23
|
+
- zeroday-lessons.json
|
|
23
24
|
atlas_refs: []
|
|
24
25
|
attack_refs: []
|
|
25
26
|
framework_gaps: []
|
|
@@ -21,11 +21,10 @@ triggers:
|
|
|
21
21
|
- stateramp
|
|
22
22
|
data_deps:
|
|
23
23
|
- cve-catalog.json
|
|
24
|
-
- atlas-ttps.json
|
|
25
|
-
- framework-control-gaps.json
|
|
26
|
-
- global-frameworks.json
|
|
27
24
|
- cwe-catalog.json
|
|
28
25
|
- d3fend-catalog.json
|
|
26
|
+
- exploit-availability.json
|
|
27
|
+
- framework-control-gaps.json
|
|
29
28
|
atlas_refs: []
|
|
30
29
|
attack_refs:
|
|
31
30
|
- T1190
|
|
@@ -22,12 +22,9 @@ triggers:
|
|
|
22
22
|
- tlpt
|
|
23
23
|
data_deps:
|
|
24
24
|
- cve-catalog.json
|
|
25
|
-
- atlas-ttps.json
|
|
26
|
-
- framework-control-gaps.json
|
|
27
|
-
- global-frameworks.json
|
|
28
|
-
- cwe-catalog.json
|
|
29
25
|
- d3fend-catalog.json
|
|
30
26
|
- dlp-controls.json
|
|
27
|
+
- framework-control-gaps.json
|
|
31
28
|
atlas_refs:
|
|
32
29
|
- AML.T0096
|
|
33
30
|
- AML.T0017
|
|
@@ -19,12 +19,7 @@ triggers:
|
|
|
19
19
|
- patient data
|
|
20
20
|
data_deps:
|
|
21
21
|
- cve-catalog.json
|
|
22
|
-
- atlas-ttps.json
|
|
23
|
-
- framework-control-gaps.json
|
|
24
|
-
- global-frameworks.json
|
|
25
|
-
- cwe-catalog.json
|
|
26
22
|
- d3fend-catalog.json
|
|
27
|
-
- dlp-controls.json
|
|
28
23
|
atlas_refs:
|
|
29
24
|
- AML.T0051
|
|
30
25
|
- AML.T0017
|
|
@@ -14,13 +14,14 @@ triggers:
|
|
|
14
14
|
- atlas update
|
|
15
15
|
- framework update
|
|
16
16
|
data_deps:
|
|
17
|
-
- cve-catalog.json
|
|
18
17
|
- atlas-ttps.json
|
|
18
|
+
- cve-catalog.json
|
|
19
|
+
- d3fend-catalog.json
|
|
20
|
+
- exploit-availability.json
|
|
19
21
|
- framework-control-gaps.json
|
|
20
22
|
- global-frameworks.json
|
|
21
|
-
- zeroday-lessons.json
|
|
22
|
-
- exploit-availability.json
|
|
23
23
|
- rfc-references.json
|
|
24
|
+
- zeroday-lessons.json
|
|
24
25
|
atlas_refs: []
|
|
25
26
|
attack_refs: []
|
|
26
27
|
framework_gaps: []
|
|
@@ -19,11 +19,12 @@ triggers:
|
|
|
19
19
|
- csaf
|
|
20
20
|
data_deps:
|
|
21
21
|
- cve-catalog.json
|
|
22
|
-
- atlas-ttps.json
|
|
23
|
-
- framework-control-gaps.json
|
|
24
|
-
- rfc-references.json
|
|
25
22
|
- cwe-catalog.json
|
|
26
23
|
- d3fend-catalog.json
|
|
24
|
+
- exploit-availability.json
|
|
25
|
+
- framework-control-gaps.json
|
|
26
|
+
- global-frameworks.json
|
|
27
|
+
- rfc-references.json
|
|
27
28
|
atlas_refs:
|
|
28
29
|
- AML.T0010
|
|
29
30
|
- AML.T0018
|
|
@@ -18,10 +18,11 @@ triggers:
|
|
|
18
18
|
- trust boundary
|
|
19
19
|
data_deps:
|
|
20
20
|
- atlas-ttps.json
|
|
21
|
-
- framework-control-gaps.json
|
|
22
21
|
- cve-catalog.json
|
|
23
22
|
- cwe-catalog.json
|
|
24
23
|
- d3fend-catalog.json
|
|
24
|
+
- framework-control-gaps.json
|
|
25
|
+
- zeroday-lessons.json
|
|
25
26
|
atlas_refs: []
|
|
26
27
|
attack_refs: []
|
|
27
28
|
framework_gaps:
|
|
@@ -19,12 +19,7 @@ triggers:
|
|
|
19
19
|
- broken access control
|
|
20
20
|
- ai generated code
|
|
21
21
|
data_deps:
|
|
22
|
-
- cve-catalog.json
|
|
23
|
-
- atlas-ttps.json
|
|
24
22
|
- framework-control-gaps.json
|
|
25
|
-
- cwe-catalog.json
|
|
26
|
-
- d3fend-catalog.json
|
|
27
|
-
- rfc-references.json
|
|
28
23
|
atlas_refs:
|
|
29
24
|
- AML.T0051
|
|
30
25
|
attack_refs:
|