@blamejs/exceptd-skills 0.12.41 → 0.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +91 -0
- package/bin/exceptd.js +52 -44
- package/data/_indexes/_meta.json +47 -47
- package/data/_indexes/chains.json +485 -13
- package/data/_indexes/jurisdiction-map.json +15 -4
- package/data/_indexes/section-offsets.json +1244 -1244
- package/data/_indexes/token-budget.json +173 -173
- package/data/atlas-ttps.json +54 -11
- package/data/attack-techniques.json +113 -17
- package/data/cve-catalog.json +17 -24
- package/data/cwe-catalog.json +8 -2
- package/data/framework-control-gaps.json +13 -3
- package/data/playbooks/ai-api.json +5 -0
- package/data/playbooks/cicd-pipeline-compromise.json +970 -0
- package/data/playbooks/cloud-iam-incident.json +4 -1
- package/data/playbooks/cred-stores.json +10 -0
- package/data/playbooks/framework.json +16 -0
- package/data/playbooks/hardening.json +4 -0
- package/data/playbooks/identity-sso-compromise.json +951 -0
- package/data/playbooks/idp-incident.json +3 -0
- package/data/playbooks/kernel.json +6 -0
- package/data/playbooks/llm-tool-use-exfil.json +963 -0
- package/data/playbooks/mcp.json +6 -0
- package/data/playbooks/runtime.json +4 -0
- package/data/playbooks/sbom.json +13 -0
- package/data/playbooks/secrets.json +6 -0
- package/data/playbooks/webhook-callback-abuse.json +916 -0
- package/lib/cross-ref-api.js +33 -13
- package/lib/cve-curation.js +12 -1
- package/lib/exit-codes.js +29 -0
- package/lib/lint-skills.js +24 -2
- package/lib/refresh-external.js +10 -1
- package/lib/scoring.js +55 -0
- package/manifest.json +83 -83
- package/orchestrator/index.js +32 -24
- package/package.json +1 -1
- package/sbom.cdx.json +122 -78
- package/scripts/predeploy.js +7 -13
- package/scripts/refresh-reverse-refs.js +86 -0
- package/scripts/refresh-sbom.js +21 -4
- package/skills/age-gates-child-safety/skill.md +1 -5
- package/skills/ai-attack-surface/skill.md +11 -4
- package/skills/ai-c2-detection/skill.md +11 -2
- package/skills/ai-risk-management/skill.md +4 -2
- package/skills/api-security/skill.md +7 -8
- package/skills/attack-surface-pentest/skill.md +2 -2
- package/skills/cloud-iam-incident/skill.md +1 -5
- package/skills/cloud-security/skill.md +0 -4
- package/skills/compliance-theater/skill.md +10 -2
- package/skills/container-runtime-security/skill.md +1 -3
- package/skills/dlp-gap-analysis/skill.md +3 -4
- package/skills/email-security-anti-phishing/skill.md +1 -8
- package/skills/exploit-scoring/skill.md +7 -2
- package/skills/framework-gap-analysis/skill.md +1 -1
- package/skills/fuzz-testing-strategy/skill.md +1 -2
- package/skills/global-grc/skill.md +3 -2
- package/skills/identity-assurance/skill.md +1 -3
- package/skills/idp-incident-response/skill.md +1 -4
- package/skills/incident-response-playbook/skill.md +1 -5
- package/skills/kernel-lpe-triage/skill.md +2 -2
- package/skills/mcp-agent-trust/skill.md +13 -3
- package/skills/mlops-security/skill.md +2 -3
- package/skills/ot-ics-security/skill.md +0 -3
- package/skills/policy-exception-gen/skill.md +11 -3
- package/skills/pqc-first/skill.md +4 -2
- package/skills/rag-pipeline-security/skill.md +2 -0
- package/skills/ransomware-response/skill.md +1 -5
- package/skills/researcher/skill.md +4 -3
- package/skills/sector-energy/skill.md +0 -4
- package/skills/sector-federal-government/skill.md +2 -3
- package/skills/sector-financial/skill.md +1 -4
- package/skills/sector-healthcare/skill.md +0 -5
- package/skills/sector-telecom/skill.md +0 -4
- package/skills/security-maturity-tiers/skill.md +1 -2
- package/skills/skill-update-loop/skill.md +4 -3
- package/skills/supply-chain-integrity/skill.md +4 -3
- package/skills/threat-model-currency/skill.md +1 -1
- package/skills/threat-modeling-methodology/skill.md +2 -1
- package/skills/webapp-security/skill.md +0 -5
package/data/atlas-ttps.json
CHANGED
|
@@ -83,7 +83,10 @@
|
|
|
83
83
|
],
|
|
84
84
|
"secure_ai_v2_layer": true,
|
|
85
85
|
"maturity": "high",
|
|
86
|
-
"last_verified": "2026-05-15"
|
|
86
|
+
"last_verified": "2026-05-15",
|
|
87
|
+
"cve_refs": [
|
|
88
|
+
"CVE-2026-42945"
|
|
89
|
+
]
|
|
87
90
|
},
|
|
88
91
|
"AML.T0010": {
|
|
89
92
|
"id": "AML.T0010",
|
|
@@ -121,7 +124,15 @@
|
|
|
121
124
|
],
|
|
122
125
|
"secure_ai_v2_layer": true,
|
|
123
126
|
"maturity": "high",
|
|
124
|
-
"last_verified": "2026-05-15"
|
|
127
|
+
"last_verified": "2026-05-15",
|
|
128
|
+
"cve_refs": [
|
|
129
|
+
"CVE-2026-30615",
|
|
130
|
+
"CVE-2026-39987",
|
|
131
|
+
"CVE-2026-45321",
|
|
132
|
+
"MAL-2026-3083",
|
|
133
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
134
|
+
"MAL-2026-TANSTACK-MINI"
|
|
135
|
+
]
|
|
125
136
|
},
|
|
126
137
|
"AML.T0016": {
|
|
127
138
|
"id": "AML.T0016",
|
|
@@ -149,7 +160,10 @@
|
|
|
149
160
|
],
|
|
150
161
|
"secure_ai_v2_layer": true,
|
|
151
162
|
"maturity": "moderate",
|
|
152
|
-
"last_verified": "2026-05-15"
|
|
163
|
+
"last_verified": "2026-05-15",
|
|
164
|
+
"cve_refs": [
|
|
165
|
+
"CVE-2026-30615"
|
|
166
|
+
]
|
|
153
167
|
},
|
|
154
168
|
"AML.T0017": {
|
|
155
169
|
"id": "AML.T0017",
|
|
@@ -220,7 +234,11 @@
|
|
|
220
234
|
],
|
|
221
235
|
"secure_ai_v2_layer": true,
|
|
222
236
|
"maturity": "moderate",
|
|
223
|
-
"last_verified": "2026-05-15"
|
|
237
|
+
"last_verified": "2026-05-15",
|
|
238
|
+
"cve_refs": [
|
|
239
|
+
"CVE-2026-45321",
|
|
240
|
+
"MAL-2026-3083"
|
|
241
|
+
]
|
|
224
242
|
},
|
|
225
243
|
"AML.T0020": {
|
|
226
244
|
"id": "AML.T0020",
|
|
@@ -252,7 +270,10 @@
|
|
|
252
270
|
],
|
|
253
271
|
"secure_ai_v2_layer": true,
|
|
254
272
|
"maturity": "high",
|
|
255
|
-
"last_verified": "2026-05-15"
|
|
273
|
+
"last_verified": "2026-05-15",
|
|
274
|
+
"cve_refs": [
|
|
275
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
276
|
+
]
|
|
256
277
|
},
|
|
257
278
|
"AML.T0024": {
|
|
258
279
|
"id": "AML.T0024",
|
|
@@ -379,7 +400,10 @@
|
|
|
379
400
|
"exceptd_skills": [],
|
|
380
401
|
"secure_ai_v2_layer": true,
|
|
381
402
|
"maturity": "moderate",
|
|
382
|
-
"last_verified": "2026-05-15"
|
|
403
|
+
"last_verified": "2026-05-15",
|
|
404
|
+
"cve_refs": [
|
|
405
|
+
"CVE-2026-45321"
|
|
406
|
+
]
|
|
383
407
|
},
|
|
384
408
|
"AML.T0051": {
|
|
385
409
|
"id": "AML.T0051",
|
|
@@ -420,7 +444,13 @@
|
|
|
420
444
|
],
|
|
421
445
|
"secure_ai_v2_layer": true,
|
|
422
446
|
"maturity": "high",
|
|
423
|
-
"last_verified": "2026-05-15"
|
|
447
|
+
"last_verified": "2026-05-15",
|
|
448
|
+
"cve_refs": [
|
|
449
|
+
"CVE-2025-53773",
|
|
450
|
+
"CVE-2026-30615",
|
|
451
|
+
"CVE-2026-39884",
|
|
452
|
+
"CVE-2026-39987"
|
|
453
|
+
]
|
|
424
454
|
},
|
|
425
455
|
"AML.T0053": {
|
|
426
456
|
"id": "AML.T0053",
|
|
@@ -450,7 +480,10 @@
|
|
|
450
480
|
"exceptd_skills": [],
|
|
451
481
|
"secure_ai_v2_layer": true,
|
|
452
482
|
"maturity": "high",
|
|
453
|
-
"last_verified": "2026-05-15"
|
|
483
|
+
"last_verified": "2026-05-15",
|
|
484
|
+
"cve_refs": [
|
|
485
|
+
"CVE-2026-39884"
|
|
486
|
+
]
|
|
454
487
|
},
|
|
455
488
|
"AML.T0054": {
|
|
456
489
|
"id": "AML.T0054",
|
|
@@ -481,7 +514,10 @@
|
|
|
481
514
|
],
|
|
482
515
|
"secure_ai_v2_layer": true,
|
|
483
516
|
"maturity": "high",
|
|
484
|
-
"last_verified": "2026-05-15"
|
|
517
|
+
"last_verified": "2026-05-15",
|
|
518
|
+
"cve_refs": [
|
|
519
|
+
"CVE-2025-53773"
|
|
520
|
+
]
|
|
485
521
|
},
|
|
486
522
|
"AML.T0055": {
|
|
487
523
|
"id": "AML.T0055",
|
|
@@ -511,7 +547,11 @@
|
|
|
511
547
|
"exceptd_skills": [],
|
|
512
548
|
"secure_ai_v2_layer": true,
|
|
513
549
|
"maturity": "moderate",
|
|
514
|
-
"last_verified": "2026-05-15"
|
|
550
|
+
"last_verified": "2026-05-15",
|
|
551
|
+
"cve_refs": [
|
|
552
|
+
"CVE-2026-42208",
|
|
553
|
+
"MAL-2026-3083"
|
|
554
|
+
]
|
|
515
555
|
},
|
|
516
556
|
"AML.T0057": {
|
|
517
557
|
"id": "AML.T0057",
|
|
@@ -582,7 +622,10 @@
|
|
|
582
622
|
],
|
|
583
623
|
"secure_ai_v2_layer": true,
|
|
584
624
|
"maturity": "high",
|
|
585
|
-
"last_verified": "2026-05-15"
|
|
625
|
+
"last_verified": "2026-05-15",
|
|
626
|
+
"cve_refs": [
|
|
627
|
+
"CVE-2026-30615"
|
|
628
|
+
]
|
|
586
629
|
},
|
|
587
630
|
"AML.T0097": {
|
|
588
631
|
"id": "AML.T0097",
|
|
@@ -66,6 +66,9 @@
|
|
|
66
66
|
"tactic_id": "TA0005",
|
|
67
67
|
"detection_strategies": [
|
|
68
68
|
"DS0009"
|
|
69
|
+
],
|
|
70
|
+
"cve_refs": [
|
|
71
|
+
"CVE-2026-32202"
|
|
69
72
|
]
|
|
70
73
|
},
|
|
71
74
|
"T1040": {
|
|
@@ -74,7 +77,10 @@
|
|
|
74
77
|
},
|
|
75
78
|
"T1041": {
|
|
76
79
|
"name": "Exfiltration Over C2 Channel",
|
|
77
|
-
"version": "v19"
|
|
80
|
+
"version": "v19",
|
|
81
|
+
"cve_refs": [
|
|
82
|
+
"CVE-2026-30615"
|
|
83
|
+
]
|
|
78
84
|
},
|
|
79
85
|
"T1053.003": {
|
|
80
86
|
"name": "Scheduled Task/Job: Cron",
|
|
@@ -91,23 +97,50 @@
|
|
|
91
97
|
"detection_strategies": [
|
|
92
98
|
"DS0009",
|
|
93
99
|
"DS0017"
|
|
100
|
+
],
|
|
101
|
+
"cve_refs": [
|
|
102
|
+
"CVE-2025-53773",
|
|
103
|
+
"CVE-2026-30615",
|
|
104
|
+
"CVE-2026-32202",
|
|
105
|
+
"CVE-2026-39884",
|
|
106
|
+
"CVE-2026-39987",
|
|
107
|
+
"CVE-2026-6973"
|
|
94
108
|
]
|
|
95
109
|
},
|
|
96
110
|
"T1059.001": {
|
|
97
111
|
"name": "Command and Scripting Interpreter: PowerShell",
|
|
98
|
-
"version": "v19"
|
|
112
|
+
"version": "v19",
|
|
113
|
+
"cve_refs": [
|
|
114
|
+
"CVE-2025-53773"
|
|
115
|
+
]
|
|
99
116
|
},
|
|
100
117
|
"T1059.006": {
|
|
101
118
|
"name": "Command and Scripting Interpreter: Python",
|
|
102
|
-
"version": "v19"
|
|
119
|
+
"version": "v19",
|
|
120
|
+
"cve_refs": [
|
|
121
|
+
"MAL-2026-3083"
|
|
122
|
+
]
|
|
103
123
|
},
|
|
104
124
|
"T1059.007": {
|
|
105
125
|
"name": "Command and Scripting Interpreter: JavaScript",
|
|
106
|
-
"version": "v19"
|
|
126
|
+
"version": "v19",
|
|
127
|
+
"cve_refs": [
|
|
128
|
+
"CVE-2026-45321",
|
|
129
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
130
|
+
]
|
|
107
131
|
},
|
|
108
132
|
"T1068": {
|
|
109
133
|
"name": "Exploitation for Privilege Escalation",
|
|
110
|
-
"version": "v19"
|
|
134
|
+
"version": "v19",
|
|
135
|
+
"cve_refs": [
|
|
136
|
+
"CVE-2026-0300",
|
|
137
|
+
"CVE-2026-31431",
|
|
138
|
+
"CVE-2026-33825",
|
|
139
|
+
"CVE-2026-43284",
|
|
140
|
+
"CVE-2026-43500",
|
|
141
|
+
"CVE-2026-46300",
|
|
142
|
+
"CVE-2026-6973"
|
|
143
|
+
]
|
|
111
144
|
},
|
|
112
145
|
"T1071": {
|
|
113
146
|
"name": "Application Layer Protocol",
|
|
@@ -115,11 +148,21 @@
|
|
|
115
148
|
},
|
|
116
149
|
"T1078": {
|
|
117
150
|
"name": "Valid Accounts",
|
|
118
|
-
"version": "v19"
|
|
151
|
+
"version": "v19",
|
|
152
|
+
"cve_refs": [
|
|
153
|
+
"CVE-2026-33825",
|
|
154
|
+
"CVE-2026-39884",
|
|
155
|
+
"CVE-2026-42897",
|
|
156
|
+
"CVE-2026-6973",
|
|
157
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
158
|
+
]
|
|
119
159
|
},
|
|
120
160
|
"T1078.001": {
|
|
121
161
|
"name": "Valid Accounts: Default Accounts",
|
|
122
|
-
"version": "v19"
|
|
162
|
+
"version": "v19",
|
|
163
|
+
"cve_refs": [
|
|
164
|
+
"CVE-2026-42208"
|
|
165
|
+
]
|
|
123
166
|
},
|
|
124
167
|
"T1078.002": {
|
|
125
168
|
"name": "Valid Accounts: Domain Accounts",
|
|
@@ -131,7 +174,11 @@
|
|
|
131
174
|
},
|
|
132
175
|
"T1078.004": {
|
|
133
176
|
"name": "Valid Accounts: Cloud Accounts",
|
|
134
|
-
"version": "v19"
|
|
177
|
+
"version": "v19",
|
|
178
|
+
"cve_refs": [
|
|
179
|
+
"CVE-2026-45321",
|
|
180
|
+
"MAL-2026-3083"
|
|
181
|
+
]
|
|
135
182
|
},
|
|
136
183
|
"T1098": {
|
|
137
184
|
"name": "Account Manipulation",
|
|
@@ -160,7 +207,11 @@
|
|
|
160
207
|
},
|
|
161
208
|
"T1133": {
|
|
162
209
|
"name": "External Remote Services",
|
|
163
|
-
"version": "v19"
|
|
210
|
+
"version": "v19",
|
|
211
|
+
"cve_refs": [
|
|
212
|
+
"CVE-2026-0300",
|
|
213
|
+
"CVE-2026-39987"
|
|
214
|
+
]
|
|
164
215
|
},
|
|
165
216
|
"T1136.001": {
|
|
166
217
|
"name": "Create Account: Local Account",
|
|
@@ -168,7 +219,17 @@
|
|
|
168
219
|
},
|
|
169
220
|
"T1190": {
|
|
170
221
|
"name": "Exploit Public-Facing Application",
|
|
171
|
-
"version": "v19"
|
|
222
|
+
"version": "v19",
|
|
223
|
+
"cve_refs": [
|
|
224
|
+
"CVE-2025-53773",
|
|
225
|
+
"CVE-2026-0300",
|
|
226
|
+
"CVE-2026-32202",
|
|
227
|
+
"CVE-2026-39987",
|
|
228
|
+
"CVE-2026-42208",
|
|
229
|
+
"CVE-2026-42897",
|
|
230
|
+
"CVE-2026-42945",
|
|
231
|
+
"CVE-2026-6973"
|
|
232
|
+
]
|
|
172
233
|
},
|
|
173
234
|
"T1195": {
|
|
174
235
|
"name": "Supply Chain Compromise",
|
|
@@ -176,11 +237,23 @@
|
|
|
176
237
|
},
|
|
177
238
|
"T1195.001": {
|
|
178
239
|
"name": "Supply Chain Compromise: Software Dependencies and Development Tools",
|
|
179
|
-
"version": "v19"
|
|
240
|
+
"version": "v19",
|
|
241
|
+
"cve_refs": [
|
|
242
|
+
"CVE-2026-30615",
|
|
243
|
+
"MAL-2026-3083",
|
|
244
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
245
|
+
"MAL-2026-TANSTACK-MINI"
|
|
246
|
+
]
|
|
180
247
|
},
|
|
181
248
|
"T1195.002": {
|
|
182
249
|
"name": "Supply Chain Compromise: Software Supply Chain",
|
|
183
|
-
"version": "v19"
|
|
250
|
+
"version": "v19",
|
|
251
|
+
"cve_refs": [
|
|
252
|
+
"CVE-2024-3094",
|
|
253
|
+
"CVE-2026-45321",
|
|
254
|
+
"MAL-2026-3083",
|
|
255
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
256
|
+
]
|
|
184
257
|
},
|
|
185
258
|
"T1199": {
|
|
186
259
|
"name": "Trusted Relationship",
|
|
@@ -245,7 +318,11 @@
|
|
|
245
318
|
},
|
|
246
319
|
"T1548.001": {
|
|
247
320
|
"name": "Abuse Elevation Control Mechanism: Setuid and Setgid",
|
|
248
|
-
"version": "v19"
|
|
321
|
+
"version": "v19",
|
|
322
|
+
"cve_refs": [
|
|
323
|
+
"CVE-2026-31431",
|
|
324
|
+
"CVE-2026-43284"
|
|
325
|
+
]
|
|
249
326
|
},
|
|
250
327
|
"T1548.003": {
|
|
251
328
|
"name": "Abuse Elevation Control Mechanism: Sudo and Sudo Caching",
|
|
@@ -257,7 +334,13 @@
|
|
|
257
334
|
},
|
|
258
335
|
"T1552.001": {
|
|
259
336
|
"name": "Unsecured Credentials: Credentials In Files",
|
|
260
|
-
"version": "v19"
|
|
337
|
+
"version": "v19",
|
|
338
|
+
"cve_refs": [
|
|
339
|
+
"CVE-2026-30615",
|
|
340
|
+
"MAL-2026-3083",
|
|
341
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
342
|
+
"MAL-2026-TANSTACK-MINI"
|
|
343
|
+
]
|
|
261
344
|
},
|
|
262
345
|
"T1552.004": {
|
|
263
346
|
"name": "Unsecured Credentials: Private Keys",
|
|
@@ -273,7 +356,10 @@
|
|
|
273
356
|
},
|
|
274
357
|
"T1554": {
|
|
275
358
|
"name": "Compromise Host Software Binary",
|
|
276
|
-
"version": "v19"
|
|
359
|
+
"version": "v19",
|
|
360
|
+
"cve_refs": [
|
|
361
|
+
"CVE-2024-3094"
|
|
362
|
+
]
|
|
277
363
|
},
|
|
278
364
|
"T1555": {
|
|
279
365
|
"name": "Credentials from Password Stores",
|
|
@@ -318,7 +404,11 @@
|
|
|
318
404
|
},
|
|
319
405
|
"T1566": {
|
|
320
406
|
"name": "Phishing",
|
|
321
|
-
"version": "v19"
|
|
407
|
+
"version": "v19",
|
|
408
|
+
"cve_refs": [
|
|
409
|
+
"CVE-2026-32202",
|
|
410
|
+
"CVE-2026-42897"
|
|
411
|
+
]
|
|
322
412
|
},
|
|
323
413
|
"T1566.001": {
|
|
324
414
|
"name": "Phishing: Spearphishing Attachment",
|
|
@@ -351,7 +441,10 @@
|
|
|
351
441
|
},
|
|
352
442
|
"T1574": {
|
|
353
443
|
"name": "Hijack Execution Flow",
|
|
354
|
-
"version": "v19"
|
|
444
|
+
"version": "v19",
|
|
445
|
+
"cve_refs": [
|
|
446
|
+
"CVE-2026-45321"
|
|
447
|
+
]
|
|
355
448
|
},
|
|
356
449
|
"T1574.005": {
|
|
357
450
|
"name": "Hijack Execution Flow: Executable Installer File Permissions Weakness",
|
|
@@ -389,6 +482,9 @@
|
|
|
389
482
|
"detection_strategies": [
|
|
390
483
|
"DS0009",
|
|
391
484
|
"DS0029"
|
|
485
|
+
],
|
|
486
|
+
"cve_refs": [
|
|
487
|
+
"CVE-2024-21626"
|
|
392
488
|
]
|
|
393
489
|
},
|
|
394
490
|
"T1613": {
|
package/data/cve-catalog.json
CHANGED
|
@@ -1460,8 +1460,6 @@
|
|
|
1460
1460
|
"rwep_correction_note": "RWEP bump:v0.12.29 ai-discovery audit re-attributed to ai_discovered=true; ai_factor advanced from 0 to 15; rwep raised by 15 from 20 to 35."
|
|
1461
1461
|
},
|
|
1462
1462
|
"CVE-2024-21626": {
|
|
1463
|
-
"_draft": true,
|
|
1464
|
-
"_auto_imported": true,
|
|
1465
1463
|
"ai_assisted_weaponization": false,
|
|
1466
1464
|
"name": "runc /proc/self/fd leak (Leaky Vessels)",
|
|
1467
1465
|
"type": "container-escape",
|
|
@@ -1522,8 +1520,6 @@
|
|
|
1522
1520
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: +5 (75 -> 80)."
|
|
1523
1521
|
},
|
|
1524
1522
|
"CVE-2024-3094": {
|
|
1525
|
-
"_draft": true,
|
|
1526
|
-
"_auto_imported": true,
|
|
1527
1523
|
"ai_assisted_weaponization": false,
|
|
1528
1524
|
"name": "xz-utils liblzma backdoor",
|
|
1529
1525
|
"type": "supply-chain-backdoor",
|
|
@@ -1595,7 +1591,7 @@
|
|
|
1595
1591
|
},
|
|
1596
1592
|
"CVE-2024-3154": {
|
|
1597
1593
|
"_draft": true,
|
|
1598
|
-
"
|
|
1594
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Red Hat Bugzilla; CWE-20 and ATT&CK T1611 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1599
1595
|
"ai_assisted_weaponization": false,
|
|
1600
1596
|
"name": "CRI-O arbitrary kernel-module load",
|
|
1601
1597
|
"type": "container-escape",
|
|
@@ -1662,7 +1658,7 @@
|
|
|
1662
1658
|
},
|
|
1663
1659
|
"CVE-2023-43472": {
|
|
1664
1660
|
"_draft": true,
|
|
1665
|
-
"
|
|
1661
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Protect AI Huntr advisory; ATLAS AML.T0016 and CWE-22 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1666
1662
|
"ai_assisted_weaponization": false,
|
|
1667
1663
|
"name": "MLflow path-traversal arbitrary file read",
|
|
1668
1664
|
"type": "path-traversal",
|
|
@@ -1723,7 +1719,7 @@
|
|
|
1723
1719
|
},
|
|
1724
1720
|
"CVE-2020-10148": {
|
|
1725
1721
|
"_draft": true,
|
|
1726
|
-
"
|
|
1722
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + CISA AA20-352A; CWE-287 and ATT&CK T1190/T1078 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1727
1723
|
"ai_assisted_weaponization": false,
|
|
1728
1724
|
"name": "SolarWinds Orion API authentication bypass (SUNBURST chain)",
|
|
1729
1725
|
"type": "auth-bypass",
|
|
@@ -1786,7 +1782,7 @@
|
|
|
1786
1782
|
},
|
|
1787
1783
|
"CVE-2023-3519": {
|
|
1788
1784
|
"_draft": true,
|
|
1789
|
-
"
|
|
1785
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Citrix CTX561482 + CISA AA23-201A; CWE-787 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1790
1786
|
"ai_assisted_weaponization": false,
|
|
1791
1787
|
"name": "Citrix NetScaler ADC/Gateway unauth RCE (CitrixBleed precursor)",
|
|
1792
1788
|
"type": "RCE",
|
|
@@ -1851,7 +1847,7 @@
|
|
|
1851
1847
|
},
|
|
1852
1848
|
"CVE-2024-1709": {
|
|
1853
1849
|
"_draft": true,
|
|
1854
|
-
"
|
|
1850
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ConnectWise advisory; ATT&CK T1190/T1078 refs resolve (cwe_refs empty but ATT&CK satisfies the resolve-at-least-one requirement). Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1855
1851
|
"ai_assisted_weaponization": false,
|
|
1856
1852
|
"name": "ConnectWise ScreenConnect auth-bypass",
|
|
1857
1853
|
"type": "auth-bypass",
|
|
@@ -1910,7 +1906,7 @@
|
|
|
1910
1906
|
},
|
|
1911
1907
|
"CVE-2026-20182": {
|
|
1912
1908
|
"_draft": true,
|
|
1913
|
-
"
|
|
1909
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against CISA KEV + Rapid7 disclosure; CWE-287 and ATT&CK T1190/T1078 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1914
1910
|
"ai_assisted_weaponization": false,
|
|
1915
1911
|
"name": "Cisco SD-WAN authentication bypass to admin",
|
|
1916
1912
|
"type": "auth-bypass",
|
|
@@ -1974,7 +1970,7 @@
|
|
|
1974
1970
|
},
|
|
1975
1971
|
"CVE-2024-40635": {
|
|
1976
1972
|
"_draft": true,
|
|
1977
|
-
"
|
|
1973
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Snyk SNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDV2PKGOCI-9479987; ATT&CK T1525 ref resolves (cwe_refs empty but ATT&CK satisfies). Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1978
1974
|
"ai_assisted_weaponization": false,
|
|
1979
1975
|
"name": "containerd integer overflow IP mask leak",
|
|
1980
1976
|
"type": "information-disclosure",
|
|
@@ -2033,8 +2029,6 @@
|
|
|
2033
2029
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: 0."
|
|
2034
2030
|
},
|
|
2035
2031
|
"MAL-2026-TANSTACK-MINI": {
|
|
2036
|
-
"_draft": true,
|
|
2037
|
-
"_auto_imported": true,
|
|
2038
2032
|
"ai_assisted_weaponization": false,
|
|
2039
2033
|
"name": "Mini Shai-Hulud (TanStack worm)",
|
|
2040
2034
|
"type": "supply-chain-worm",
|
|
@@ -2106,7 +2100,8 @@
|
|
|
2106
2100
|
},
|
|
2107
2101
|
"MAL-2026-ANTHROPIC-MCP-STDIO": {
|
|
2108
2102
|
"_draft": true,
|
|
2109
|
-
"
|
|
2103
|
+
"_quarantine": true,
|
|
2104
|
+
"_quarantine_reason": "Duplicate of CVE-2026-30623 (Anthropic MCP SDK stdio command-injection). This entry was the pre-CVE-assignment embargoed placeholder for the OX Security MCP stdio command-injection disclosure (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); the embargo lifted with the April 2026 vendor advisory and the issue received CVE-2026-30623. Canonical id: CVE-2026-30623. Retained as _draft: true so the validator treats it as a non-failing draft warning; downstream tooling should filter on _quarantine: true and skip these entries.",
|
|
2110
2105
|
"ai_assisted_weaponization": false,
|
|
2111
2106
|
"name": "Anthropic SDK MCP STDIO command-injection (embargoed)",
|
|
2112
2107
|
"type": "command-injection",
|
|
@@ -2175,7 +2170,7 @@
|
|
|
2175
2170
|
},
|
|
2176
2171
|
"CVE-2026-GTIG-AI-2FA": {
|
|
2177
2172
|
"_draft": true,
|
|
2178
|
-
"
|
|
2173
|
+
"_draft_reason": "Placeholder entry — affected product is unnamed under GTIG embargo and affected_versions is set to \"pending-disclosure\". The key itself is not a real CVE identifier (GTIG-tracked, no MITRE assignment yet). Hard Rule #1 fields cannot be verified against a vendor advisory until the embargo lifts and a real CVE id is assigned. Re-triage once GTIG/MITRE publishes the canonical id and affected-product list.",
|
|
2179
2174
|
"name": "GTIG-tracked AI-built 2FA-bypass zero-day (placeholder)",
|
|
2180
2175
|
"type": "auth-bypass",
|
|
2181
2176
|
"cvss_score": 8.1,
|
|
@@ -2248,7 +2243,7 @@
|
|
|
2248
2243
|
},
|
|
2249
2244
|
"CVE-2026-30623": {
|
|
2250
2245
|
"_draft": true,
|
|
2251
|
-
"
|
|
2246
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + OX Security advisory (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); CWE-78/88, ATLAS AML.T0040 and ATT&CK T1059 refs resolve. This entry is the published successor of the quarantined MAL-2026-ANTHROPIC-MCP-STDIO placeholder. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2252
2247
|
"ai_assisted_weaponization": false,
|
|
2253
2248
|
"name": "Anthropic MCP SDK stdio command-injection",
|
|
2254
2249
|
"type": "command-injection",
|
|
@@ -2315,7 +2310,7 @@
|
|
|
2315
2310
|
},
|
|
2316
2311
|
"CVE-2025-12686": {
|
|
2317
2312
|
"_draft": true,
|
|
2318
|
-
"
|
|
2313
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Synacktiv Pwn2Own writeup; CWE-78 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2319
2314
|
"ai_assisted_weaponization": false,
|
|
2320
2315
|
"name": "Synology BeeStation unauth RCE (Pwn2Own Ireland 2025)",
|
|
2321
2316
|
"type": "RCE",
|
|
@@ -2375,7 +2370,7 @@
|
|
|
2375
2370
|
},
|
|
2376
2371
|
"CVE-2025-62847": {
|
|
2377
2372
|
"_draft": true,
|
|
2378
|
-
"
|
|
2373
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ZDI Pwn2Own Ireland 2025 day-one results + DEVCORE Research Team attribution; CWE-78 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2379
2374
|
"ai_assisted_weaponization": false,
|
|
2380
2375
|
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 1/3)",
|
|
2381
2376
|
"type": "RCE",
|
|
@@ -2437,7 +2432,7 @@
|
|
|
2437
2432
|
},
|
|
2438
2433
|
"CVE-2025-62848": {
|
|
2439
2434
|
"_draft": true,
|
|
2440
|
-
"
|
|
2435
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ZDI Pwn2Own Ireland 2025 day-one results + DEVCORE Research Team attribution; CWE-94 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2441
2436
|
"ai_assisted_weaponization": false,
|
|
2442
2437
|
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 2/3)",
|
|
2443
2438
|
"type": "RCE",
|
|
@@ -2499,7 +2494,7 @@
|
|
|
2499
2494
|
},
|
|
2500
2495
|
"CVE-2025-62849": {
|
|
2501
2496
|
"_draft": true,
|
|
2502
|
-
"
|
|
2497
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ZDI Pwn2Own Ireland 2025 day-one results + DEVCORE Research Team attribution; CWE-269 and ATT&CK T1068 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2503
2498
|
"ai_assisted_weaponization": false,
|
|
2504
2499
|
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 3/3)",
|
|
2505
2500
|
"type": "RCE",
|
|
@@ -2561,7 +2556,7 @@
|
|
|
2561
2556
|
},
|
|
2562
2557
|
"CVE-2025-59389": {
|
|
2563
2558
|
"_draft": true,
|
|
2564
|
-
"
|
|
2559
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + QNAP QSA-25-48 + ZDI Pwn2Own attribution (Sina Kheirkhah, Summoning Team); CWE-78 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2565
2560
|
"ai_assisted_weaponization": false,
|
|
2566
2561
|
"name": "QNAP Hyper Data Protector critical RCE (Pwn2Own Ireland 2025)",
|
|
2567
2562
|
"type": "RCE",
|
|
@@ -2622,7 +2617,7 @@
|
|
|
2622
2617
|
},
|
|
2623
2618
|
"CVE-2025-11837": {
|
|
2624
2619
|
"_draft": true,
|
|
2625
|
-
"
|
|
2620
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + QNAP QSA-25-47 + Pwn2Own attribution (Chumy Tsai, CyCraft Technology); CWE-94 and ATT&CK T1059/T1554 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2626
2621
|
"ai_assisted_weaponization": false,
|
|
2627
2622
|
"name": "QNAP Malware Remover code-injection",
|
|
2628
2623
|
"type": "code-injection",
|
|
@@ -2683,8 +2678,6 @@
|
|
|
2683
2678
|
"discovery_attribution_note": "Pwn2Own Ireland 2025 — Chumy Tsai of CyCraft Technology demonstrated the code-injection on QNAP TS-453E ($20,000 award). Named-human researcher via ZDI credit; no AI-tool attribution. Source: https://www.qnap.com/en/security-advisory/qsa-25-47 and https://cybersecuritynews.com/qnap-zero-day-vulnerabilities-exploited/."
|
|
2684
2679
|
},
|
|
2685
2680
|
"CVE-2026-42945": {
|
|
2686
|
-
"_draft": true,
|
|
2687
|
-
"_auto_imported": true,
|
|
2688
2681
|
"name": "NGINX Rift",
|
|
2689
2682
|
"type": "RCE",
|
|
2690
2683
|
"cvss_score": 9.2,
|
package/data/cwe-catalog.json
CHANGED
|
@@ -1127,8 +1127,10 @@
|
|
|
1127
1127
|
],
|
|
1128
1128
|
"skills_referencing": [],
|
|
1129
1129
|
"evidence_cves": [
|
|
1130
|
+
"CVE-2024-3094",
|
|
1130
1131
|
"MAL-2026-3083",
|
|
1131
|
-
"MAL-2026-NODE-IPC-STEALER"
|
|
1132
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
1133
|
+
"MAL-2026-TANSTACK-MINI"
|
|
1132
1134
|
],
|
|
1133
1135
|
"framework_controls_partially_addressing": [
|
|
1134
1136
|
"NIST-800-53-SA-12",
|
|
@@ -1349,6 +1351,7 @@
|
|
|
1349
1351
|
],
|
|
1350
1352
|
"evidence_cves": [
|
|
1351
1353
|
"CVE-2026-0300",
|
|
1354
|
+
"CVE-2026-42945",
|
|
1352
1355
|
"CVE-2026-43500",
|
|
1353
1356
|
"CVE-2026-46300"
|
|
1354
1357
|
],
|
|
@@ -1656,6 +1659,7 @@
|
|
|
1656
1659
|
"supply-chain-integrity"
|
|
1657
1660
|
],
|
|
1658
1661
|
"evidence_cves": [
|
|
1662
|
+
"CVE-2024-3094",
|
|
1659
1663
|
"MAL-2026-NODE-IPC-STEALER"
|
|
1660
1664
|
],
|
|
1661
1665
|
"framework_controls_partially_addressing": [
|
|
@@ -1688,7 +1692,9 @@
|
|
|
1688
1692
|
"sector-federal-government",
|
|
1689
1693
|
"supply-chain-integrity"
|
|
1690
1694
|
],
|
|
1691
|
-
"evidence_cves": [
|
|
1695
|
+
"evidence_cves": [
|
|
1696
|
+
"MAL-2026-TANSTACK-MINI"
|
|
1697
|
+
],
|
|
1692
1698
|
"framework_controls_partially_addressing": [
|
|
1693
1699
|
"NIST-800-53-SA-12",
|
|
1694
1700
|
"NIST-800-53-SI-2",
|
|
@@ -724,10 +724,13 @@
|
|
|
724
724
|
"status": "open",
|
|
725
725
|
"opened_date": "2026-05-13",
|
|
726
726
|
"evidence_cves": [
|
|
727
|
+
"CVE-2024-3094",
|
|
727
728
|
"CVE-2026-42897",
|
|
729
|
+
"CVE-2026-42945",
|
|
728
730
|
"CVE-2026-45321",
|
|
729
731
|
"MAL-2026-3083",
|
|
730
|
-
"MAL-2026-NODE-IPC-STEALER"
|
|
732
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
733
|
+
"MAL-2026-TANSTACK-MINI"
|
|
731
734
|
],
|
|
732
735
|
"atlas_refs": [
|
|
733
736
|
"AML.T0010",
|
|
@@ -1099,6 +1102,7 @@
|
|
|
1099
1102
|
"status": "open",
|
|
1100
1103
|
"opened_date": "2026-04-01",
|
|
1101
1104
|
"evidence_cves": [
|
|
1105
|
+
"CVE-2024-3094",
|
|
1102
1106
|
"CVE-2026-30615"
|
|
1103
1107
|
],
|
|
1104
1108
|
"atlas_refs": [
|
|
@@ -1135,6 +1139,7 @@
|
|
|
1135
1139
|
"evidence_cves": [
|
|
1136
1140
|
"CVE-2026-0300",
|
|
1137
1141
|
"CVE-2026-31431",
|
|
1142
|
+
"CVE-2026-42945",
|
|
1138
1143
|
"CVE-2026-46300"
|
|
1139
1144
|
],
|
|
1140
1145
|
"atlas_refs": [],
|
|
@@ -1699,6 +1704,7 @@
|
|
|
1699
1704
|
"CVE-2026-32202",
|
|
1700
1705
|
"CVE-2026-33825",
|
|
1701
1706
|
"CVE-2026-42897",
|
|
1707
|
+
"CVE-2026-42945",
|
|
1702
1708
|
"CVE-2026-43284",
|
|
1703
1709
|
"CVE-2026-43500",
|
|
1704
1710
|
"CVE-2026-46300",
|
|
@@ -2316,6 +2322,7 @@
|
|
|
2316
2322
|
"status": "open",
|
|
2317
2323
|
"opened_date": "2026-05-11",
|
|
2318
2324
|
"evidence_cves": [
|
|
2325
|
+
"CVE-2024-3094",
|
|
2319
2326
|
"CVE-2026-45321",
|
|
2320
2327
|
"MAL-2026-3083",
|
|
2321
2328
|
"MAL-2026-NODE-IPC-STEALER"
|
|
@@ -3653,7 +3660,8 @@
|
|
|
3653
3660
|
"status": "open",
|
|
3654
3661
|
"opened_date": "2026-05-15",
|
|
3655
3662
|
"evidence_cves": [
|
|
3656
|
-
"CVE-2026-0300"
|
|
3663
|
+
"CVE-2026-0300",
|
|
3664
|
+
"CVE-2026-42945"
|
|
3657
3665
|
],
|
|
3658
3666
|
"atlas_refs": [],
|
|
3659
3667
|
"attack_refs": [
|
|
@@ -3689,6 +3697,7 @@
|
|
|
3689
3697
|
"evidence_cves": [
|
|
3690
3698
|
"CVE-2026-0300",
|
|
3691
3699
|
"CVE-2026-42897",
|
|
3700
|
+
"CVE-2026-42945",
|
|
3692
3701
|
"CVE-2026-46300"
|
|
3693
3702
|
],
|
|
3694
3703
|
"atlas_refs": [],
|
|
@@ -4058,7 +4067,8 @@
|
|
|
4058
4067
|
"status": "open",
|
|
4059
4068
|
"opened_date": "2026-05-17",
|
|
4060
4069
|
"evidence_cves": [
|
|
4061
|
-
"MAL-2026-NODE-IPC-STEALER"
|
|
4070
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
4071
|
+
"MAL-2026-TANSTACK-MINI"
|
|
4062
4072
|
],
|
|
4063
4073
|
"atlas_refs": [
|
|
4064
4074
|
"AML.T0010",
|