@blamejs/exceptd-skills 0.13.2 → 0.13.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (64) hide show
  1. package/AGENTS.md +41 -4
  2. package/CHANGELOG.md +73 -0
  3. package/README.md +79 -13
  4. package/bin/exceptd.js +105 -1
  5. package/data/_indexes/_meta.json +47 -47
  6. package/data/_indexes/activity-feed.json +3 -3
  7. package/data/_indexes/catalog-summaries.json +3 -3
  8. package/data/_indexes/chains.json +125 -32
  9. package/data/_indexes/frequency.json +12 -0
  10. package/data/_indexes/handoff-dag.json +127 -57
  11. package/data/_indexes/section-offsets.json +541 -487
  12. package/data/_indexes/summary-cards.json +34 -34
  13. package/data/_indexes/token-budget.json +329 -299
  14. package/data/attack-techniques.json +2 -0
  15. package/data/cve-catalog.json +99 -146
  16. package/data/cwe-catalog.json +1 -0
  17. package/data/exploit-availability.json +0 -27
  18. package/data/framework-control-gaps.json +409 -0
  19. package/data/zeroday-lessons.json +71 -89
  20. package/lib/lint-skills.js +17 -13
  21. package/lib/schemas/playbook.schema.json +5 -0
  22. package/lib/source-advisories.js +26 -0
  23. package/manifest.json +82 -82
  24. package/orchestrator/index.js +147 -2
  25. package/package.json +1 -1
  26. package/sbom.cdx.json +61 -61
  27. package/skills/age-gates-child-safety/skill.md +2 -0
  28. package/skills/ai-attack-surface/skill.md +2 -0
  29. package/skills/ai-c2-detection/skill.md +2 -0
  30. package/skills/ai-risk-management/skill.md +2 -0
  31. package/skills/api-security/skill.md +16 -4
  32. package/skills/attack-surface-pentest/skill.md +2 -0
  33. package/skills/cloud-iam-incident/skill.md +1 -1
  34. package/skills/cloud-security/skill.md +2 -0
  35. package/skills/compliance-theater/skill.md +28 -2
  36. package/skills/container-runtime-security/skill.md +2 -0
  37. package/skills/coordinated-vuln-disclosure/skill.md +1 -1
  38. package/skills/defensive-countermeasure-mapping/skill.md +2 -0
  39. package/skills/dlp-gap-analysis/skill.md +2 -0
  40. package/skills/email-security-anti-phishing/skill.md +14 -4
  41. package/skills/exploit-scoring/skill.md +30 -1
  42. package/skills/framework-gap-analysis/skill.md +28 -1
  43. package/skills/fuzz-testing-strategy/skill.md +4 -2
  44. package/skills/global-grc/skill.md +2 -0
  45. package/skills/identity-assurance/skill.md +2 -0
  46. package/skills/kernel-lpe-triage/skill.md +2 -0
  47. package/skills/mcp-agent-trust/skill.md +4 -0
  48. package/skills/mlops-security/skill.md +2 -0
  49. package/skills/ot-ics-security/skill.md +2 -0
  50. package/skills/policy-exception-gen/skill.md +28 -1
  51. package/skills/pqc-first/skill.md +2 -0
  52. package/skills/rag-pipeline-security/skill.md +2 -0
  53. package/skills/researcher/skill.md +2 -0
  54. package/skills/sector-energy/skill.md +2 -0
  55. package/skills/sector-federal-government/skill.md +2 -0
  56. package/skills/sector-financial/skill.md +2 -0
  57. package/skills/sector-healthcare/skill.md +2 -0
  58. package/skills/security-maturity-tiers/skill.md +2 -0
  59. package/skills/skill-update-loop/skill.md +2 -0
  60. package/skills/supply-chain-integrity/skill.md +2 -0
  61. package/skills/threat-model-currency/skill.md +37 -1
  62. package/skills/threat-modeling-methodology/skill.md +2 -0
  63. package/skills/webapp-security/skill.md +2 -0
  64. package/skills/zeroday-gap-learn/skill.md +33 -1
@@ -62,7 +62,7 @@
62
62
  "rebuild_after_days": 365,
63
63
  "note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
64
64
  },
65
- "entry_count": 39,
65
+ "entry_count": 38,
66
66
  "sample_keys": [
67
67
  "CVE-2025-53773",
68
68
  "CVE-2026-30615",
@@ -150,7 +150,7 @@
150
150
  "rebuild_after_days": 365,
151
151
  "note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
152
152
  },
153
- "entry_count": 30,
153
+ "entry_count": 28,
154
154
  "sample_keys": [
155
155
  "CVE-2025-53773",
156
156
  "CVE-2026-30615",
@@ -172,7 +172,7 @@
172
172
  "rebuild_after_days": 365,
173
173
  "note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
174
174
  },
175
- "entry_count": 130,
175
+ "entry_count": 142,
176
176
  "sample_keys": [
177
177
  "ALL-AI-PIPELINE-INTEGRITY",
178
178
  "ALL-MCP-TOOL-TRUST",
@@ -4359,38 +4359,6 @@
4359
4359
  "rfc_refs": []
4360
4360
  }
4361
4361
  },
4362
- "MAL-2026-ANTHROPIC-MCP-STDIO": {
4363
- "name": "Anthropic SDK MCP STDIO command-injection (embargoed)",
4364
- "rwep": 25,
4365
- "cvss": 9,
4366
- "cisa_kev": false,
4367
- "epss_score": null,
4368
- "referencing_skills": [],
4369
- "chain": {
4370
- "cwes": [],
4371
- "atlas": [],
4372
- "d3fend": [],
4373
- "framework_gaps": [],
4374
- "attack_refs": [],
4375
- "rfc_refs": []
4376
- }
4377
- },
4378
- "CVE-2026-GTIG-AI-2FA": {
4379
- "name": "GTIG-tracked AI-built 2FA-bypass zero-day (placeholder)",
4380
- "rwep": 55,
4381
- "cvss": 8.1,
4382
- "cisa_kev": false,
4383
- "epss_score": null,
4384
- "referencing_skills": [],
4385
- "chain": {
4386
- "cwes": [],
4387
- "atlas": [],
4388
- "d3fend": [],
4389
- "framework_gaps": [],
4390
- "attack_refs": [],
4391
- "rfc_refs": []
4392
- }
4393
- },
4394
4362
  "CVE-2026-30623": {
4395
4363
  "name": "Anthropic MCP SDK stdio command-injection",
4396
4364
  "rwep": 30,
@@ -7395,6 +7363,125 @@
7395
7363
  ]
7396
7364
  }
7397
7365
  },
7366
+ "CVE-2024-21762": {
7367
+ "name": "Fortinet FortiOS / FortiProxy SSL-VPN out-of-bounds write (sslvpnd preauth RCE)",
7368
+ "rwep": 85,
7369
+ "cvss": 9.8,
7370
+ "cisa_kev": true,
7371
+ "epss_score": null,
7372
+ "referencing_skills": [
7373
+ "kernel-lpe-triage",
7374
+ "coordinated-vuln-disclosure"
7375
+ ],
7376
+ "chain": {
7377
+ "cwes": [
7378
+ {
7379
+ "id": "CWE-125",
7380
+ "name": "Out-of-bounds Read",
7381
+ "category": "Memory Safety"
7382
+ },
7383
+ {
7384
+ "id": "CWE-1357",
7385
+ "name": "Reliance on Insufficiently Trustworthy Component",
7386
+ "category": "Supply Chain"
7387
+ },
7388
+ {
7389
+ "id": "CWE-362",
7390
+ "name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
7391
+ "category": "Concurrency"
7392
+ },
7393
+ {
7394
+ "id": "CWE-416",
7395
+ "name": "Use After Free",
7396
+ "category": "Memory Safety"
7397
+ },
7398
+ {
7399
+ "id": "CWE-672",
7400
+ "name": "Operation on a Resource after Expiration or Release",
7401
+ "category": "Memory Safety"
7402
+ },
7403
+ {
7404
+ "id": "CWE-787",
7405
+ "name": "Out-of-bounds Write",
7406
+ "category": "Memory Safety"
7407
+ }
7408
+ ],
7409
+ "atlas": [],
7410
+ "d3fend": [
7411
+ {
7412
+ "id": "D3-ASLR",
7413
+ "name": "Address Space Layout Randomization",
7414
+ "tactic": "Harden"
7415
+ },
7416
+ {
7417
+ "id": "D3-EAL",
7418
+ "name": "Executable Allowlisting",
7419
+ "tactic": "Harden"
7420
+ },
7421
+ {
7422
+ "id": "D3-PHRA",
7423
+ "name": "Process Hardware Resource Access",
7424
+ "tactic": "Isolate"
7425
+ },
7426
+ {
7427
+ "id": "D3-PSEP",
7428
+ "name": "Process Segment Execution Prevention",
7429
+ "tactic": "Harden"
7430
+ }
7431
+ ],
7432
+ "framework_gaps": [
7433
+ {
7434
+ "id": "CIS-Controls-v8-Control7",
7435
+ "framework": "CIS Controls v8",
7436
+ "control_name": "Continuous Vulnerability Management"
7437
+ },
7438
+ {
7439
+ "id": "ISO-27001-2022-A.8.8",
7440
+ "framework": "ISO/IEC 27001:2022",
7441
+ "control_name": "Management of technical vulnerabilities"
7442
+ },
7443
+ {
7444
+ "id": "NIS2-Art21-patch-management",
7445
+ "framework": "EU NIS2 Directive",
7446
+ "control_name": "Vulnerability handling and disclosure"
7447
+ },
7448
+ {
7449
+ "id": "NIST-800-218-SSDF",
7450
+ "framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
7451
+ "control_name": "Secure Software Development Framework"
7452
+ },
7453
+ {
7454
+ "id": "NIST-800-53-SC-8",
7455
+ "framework": "NIST SP 800-53 Rev 5",
7456
+ "control_name": "Transmission Confidentiality and Integrity"
7457
+ },
7458
+ {
7459
+ "id": "NIST-800-53-SI-2",
7460
+ "framework": "NIST SP 800-53 Rev 5",
7461
+ "control_name": "Flaw Remediation"
7462
+ },
7463
+ {
7464
+ "id": "PCI-DSS-4.0-6.3.3",
7465
+ "framework": "PCI DSS 4.0",
7466
+ "control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates"
7467
+ },
7468
+ {
7469
+ "id": "SOC2-CC9-vendor-management",
7470
+ "framework": "SOC 2 (AICPA Trust Services Criteria)",
7471
+ "control_name": "Risk Mitigation — Vendor and Business Partner Risk"
7472
+ }
7473
+ ],
7474
+ "attack_refs": [
7475
+ "T1068",
7476
+ "T1548.001"
7477
+ ],
7478
+ "rfc_refs": [
7479
+ "RFC-4301",
7480
+ "RFC-4303",
7481
+ "RFC-7296"
7482
+ ]
7483
+ }
7484
+ },
7398
7485
  "CWE-20": {
7399
7486
  "name": "Improper Input Validation",
7400
7487
  "category": "Validation",
@@ -8648,6 +8735,7 @@
8648
8735
  },
8649
8736
  "related_cves": [
8650
8737
  "CVE-2023-3519",
8738
+ "CVE-2024-21762",
8651
8739
  "CVE-2025-12686",
8652
8740
  "CVE-2025-59389",
8653
8741
  "CVE-2025-62847",
@@ -10763,6 +10851,7 @@
10763
10851
  },
10764
10852
  "related_cves": [
10765
10853
  "CVE-2023-3519",
10854
+ "CVE-2024-21762",
10766
10855
  "CVE-2025-12686",
10767
10856
  "CVE-2025-59389",
10768
10857
  "CVE-2025-62847",
@@ -10900,6 +10989,7 @@
10900
10989
  },
10901
10990
  "related_cves": [
10902
10991
  "CVE-2023-3519",
10992
+ "CVE-2024-21762",
10903
10993
  "CVE-2025-12686",
10904
10994
  "CVE-2025-59389",
10905
10995
  "CVE-2025-62847",
@@ -11820,6 +11910,7 @@
11820
11910
  },
11821
11911
  "related_cves": [
11822
11912
  "CVE-2023-3519",
11913
+ "CVE-2024-21762",
11823
11914
  "CVE-2025-12686",
11824
11915
  "CVE-2025-59389",
11825
11916
  "CVE-2025-62847",
@@ -12336,6 +12427,7 @@
12336
12427
  "related_cves": [
12337
12428
  "CVE-2023-3519",
12338
12429
  "CVE-2023-43472",
12430
+ "CVE-2024-21762",
12339
12431
  "CVE-2024-3094",
12340
12432
  "CVE-2024-3154",
12341
12433
  "CVE-2025-12686",
@@ -14064,6 +14156,7 @@
14064
14156
  ]
14065
14157
  },
14066
14158
  "related_cves": [
14159
+ "CVE-2024-21762",
14067
14160
  "CVE-2024-3094",
14068
14161
  "CVE-2026-0300",
14069
14162
  "CVE-2026-30615",
@@ -2521,7 +2521,11 @@
2521
2521
  "AU-Essential-8-MFA",
2522
2522
  "AU-Essential-8-Patch",
2523
2523
  "AU-ISM-1546",
2524
+ "AU-ISM-1808",
2524
2525
  "CIS-Controls-v8-10.1",
2526
+ "CIS-Controls-v8-Control6",
2527
+ "CIS-Kubernetes-Benchmark-4.2.13",
2528
+ "CIS-Kubernetes-Benchmark-5.3",
2525
2529
  "CIS-Kubernetes-Benchmark-5.7",
2526
2530
  "DORA-Art-9",
2527
2531
  "DORA-Art28",
@@ -2539,23 +2543,31 @@
2539
2543
  "HIPAA-Security-Rule-2026-NPRM-164.310",
2540
2544
  "HIPAA-Security-Rule-2026-NPRM-164.312",
2541
2545
  "HIPAA-Security-Rule-2026-NPRM-164.314",
2546
+ "ISO-27001-2022-A.5.15",
2542
2547
  "ISO-27001-2022-A.5.7",
2548
+ "ISO-27001-2022-A.8.13",
2543
2549
  "ISO-27001-2022-A.8.22",
2544
2550
  "ISO-27001-2022-A.8.7",
2551
+ "NIS2-Art21-business-continuity",
2545
2552
  "NIS2-Art21-identity-management",
2546
2553
  "NIS2-Art21-incident-handling",
2554
+ "NIS2-Art21-network-security",
2547
2555
  "NIS2-Art21-supply-chain",
2548
2556
  "NIS2-Art21-vulnerability-management",
2549
2557
  "NIST-800-218-SSDF-PW.4",
2550
2558
  "NIST-800-53-AC-3",
2551
2559
  "NIST-800-53-AC-6",
2560
+ "NIST-800-53-IA-2",
2552
2561
  "NIST-800-53-SC-39",
2553
2562
  "NIST-800-53-SC-44",
2554
2563
  "NIST-800-53-SI-10",
2555
2564
  "NIST-800-53-SR-3",
2556
2565
  "NIST-AI-RMF-MAP-3.4",
2566
+ "NIST-AI-RMF-MEASURE-2.7",
2557
2567
  "OWASP-LLM-Top-10-2025-LLM05",
2568
+ "OWASP-ML-Top-10-2023-ML06",
2558
2569
  "OWASP-Top-10-2021-A06",
2570
+ "PCI-DSS-4.0-5.1",
2559
2571
  "PCI-DSS-4.0.1-11.6.1",
2560
2572
  "PCI-DSS-4.0.1-12.10.7",
2561
2573
  "PCI-DSS-4.0.1-12.3.3",
@@ -49,20 +49,42 @@
49
49
  "compliance-theater",
50
50
  "defensive-countermeasure-mapping",
51
51
  "exploit-scoring",
52
+ "incident-response-playbook",
52
53
  "policy-exception-gen"
53
54
  ],
54
- "ai-attack-surface": [],
55
+ "ai-attack-surface": [
56
+ "incident-response-playbook",
57
+ "mcp-agent-trust",
58
+ "rag-pipeline-security"
59
+ ],
55
60
  "mcp-agent-trust": [
61
+ "ai-attack-surface",
56
62
  "attack-surface-pentest",
63
+ "compliance-theater",
57
64
  "defensive-countermeasure-mapping",
58
65
  "dlp-gap-analysis",
59
66
  "framework-gap-analysis",
60
67
  "supply-chain-integrity"
61
68
  ],
62
69
  "framework-gap-analysis": [],
63
- "compliance-theater": [],
70
+ "compliance-theater": [
71
+ "ai-attack-surface",
72
+ "ai-c2-detection",
73
+ "email-security-anti-phishing",
74
+ "framework-gap-analysis",
75
+ "global-grc",
76
+ "identity-assurance",
77
+ "incident-response-playbook",
78
+ "kernel-lpe-triage",
79
+ "mcp-agent-trust",
80
+ "mlops-security",
81
+ "policy-exception-gen",
82
+ "supply-chain-integrity"
83
+ ],
64
84
  "exploit-scoring": [
65
85
  "ai-attack-surface",
86
+ "compliance-theater",
87
+ "incident-response-playbook",
66
88
  "kernel-lpe-triage",
67
89
  "mcp-agent-trust"
68
90
  ],
@@ -71,25 +93,42 @@
71
93
  "attack-surface-pentest",
72
94
  "defensive-countermeasure-mapping",
73
95
  "dlp-gap-analysis",
96
+ "mlops-security",
74
97
  "supply-chain-integrity"
75
98
  ],
76
99
  "ai-c2-detection": [
100
+ "ai-attack-surface",
77
101
  "attack-surface-pentest",
78
102
  "compliance-theater",
79
103
  "defensive-countermeasure-mapping",
80
104
  "dlp-gap-analysis",
105
+ "incident-response-playbook",
81
106
  "mcp-agent-trust"
82
107
  ],
83
108
  "policy-exception-gen": [],
84
- "threat-model-currency": [],
85
- "global-grc": [],
109
+ "threat-model-currency": [
110
+ "ai-attack-surface",
111
+ "framework-gap-analysis",
112
+ "global-grc",
113
+ "kernel-lpe-triage",
114
+ "policy-exception-gen"
115
+ ],
116
+ "global-grc": [
117
+ "framework-gap-analysis",
118
+ "policy-exception-gen"
119
+ ],
86
120
  "zeroday-gap-learn": [
87
121
  "ai-attack-surface",
88
122
  "ai-c2-detection",
123
+ "defensive-countermeasure-mapping",
124
+ "framework-gap-analysis",
89
125
  "kernel-lpe-triage",
90
126
  "mcp-agent-trust"
91
127
  ],
92
- "pqc-first": [],
128
+ "pqc-first": [
129
+ "compliance-theater",
130
+ "framework-gap-analysis"
131
+ ],
93
132
  "skill-update-loop": [
94
133
  "ai-c2-detection",
95
134
  "ai-risk-management",
@@ -113,7 +152,11 @@
113
152
  "threat-modeling-methodology",
114
153
  "webapp-security"
115
154
  ],
116
- "security-maturity-tiers": [],
155
+ "security-maturity-tiers": [
156
+ "compliance-theater",
157
+ "global-grc",
158
+ "policy-exception-gen"
159
+ ],
117
160
  "researcher": [
118
161
  "age-gates-child-safety",
119
162
  "ai-attack-surface",
@@ -154,14 +197,25 @@
154
197
  "zeroday-gap-learn"
155
198
  ],
156
199
  "attack-surface-pentest": [
200
+ "compliance-theater",
201
+ "exploit-scoring",
202
+ "incident-response-playbook",
157
203
  "kernel-lpe-triage"
158
204
  ],
159
- "fuzz-testing-strategy": [],
205
+ "fuzz-testing-strategy": [
206
+ "compliance-theater",
207
+ "zeroday-gap-learn"
208
+ ],
160
209
  "dlp-gap-analysis": [
161
- "ai-c2-detection"
210
+ "ai-attack-surface",
211
+ "ai-c2-detection",
212
+ "compliance-theater",
213
+ "email-security-anti-phishing"
162
214
  ],
163
215
  "supply-chain-integrity": [
216
+ "compliance-theater",
164
217
  "mcp-agent-trust",
218
+ "mlops-security",
165
219
  "pqc-first"
166
220
  ],
167
221
  "defensive-countermeasure-mapping": [
@@ -176,6 +230,8 @@
176
230
  "compliance-theater",
177
231
  "defensive-countermeasure-mapping",
178
232
  "dlp-gap-analysis",
233
+ "email-security-anti-phishing",
234
+ "idp-incident-response",
179
235
  "mcp-agent-trust",
180
236
  "pqc-first",
181
237
  "supply-chain-integrity"
@@ -189,9 +245,11 @@
189
245
  "framework-gap-analysis",
190
246
  "global-grc",
191
247
  "identity-assurance",
248
+ "incident-response-playbook",
192
249
  "kernel-lpe-triage",
193
250
  "mcp-agent-trust",
194
251
  "policy-exception-gen",
252
+ "sector-energy",
195
253
  "supply-chain-integrity"
196
254
  ],
197
255
  "coordinated-vuln-disclosure": [
@@ -213,6 +271,7 @@
213
271
  "defensive-countermeasure-mapping",
214
272
  "framework-gap-analysis",
215
273
  "mcp-agent-trust",
274
+ "policy-exception-gen",
216
275
  "rag-pipeline-security",
217
276
  "researcher",
218
277
  "threat-model-currency",
@@ -221,7 +280,9 @@
221
280
  "webapp-security": [
222
281
  "ai-attack-surface",
223
282
  "ai-c2-detection",
283
+ "api-security",
224
284
  "attack-surface-pentest",
285
+ "compliance-theater",
225
286
  "defensive-countermeasure-mapping",
226
287
  "fuzz-testing-strategy",
227
288
  "identity-assurance",
@@ -252,6 +313,7 @@
252
313
  "framework-gap-analysis",
253
314
  "global-grc",
254
315
  "identity-assurance",
316
+ "incident-response-playbook",
255
317
  "mcp-agent-trust",
256
318
  "ot-ics-security",
257
319
  "policy-exception-gen",
@@ -263,10 +325,12 @@
263
325
  "compliance-theater",
264
326
  "coordinated-vuln-disclosure",
265
327
  "dlp-gap-analysis",
328
+ "email-security-anti-phishing",
266
329
  "exploit-scoring",
267
330
  "framework-gap-analysis",
268
331
  "global-grc",
269
332
  "identity-assurance",
333
+ "incident-response-playbook",
270
334
  "mcp-agent-trust",
271
335
  "policy-exception-gen",
272
336
  "supply-chain-integrity"
@@ -279,6 +343,7 @@
279
343
  "framework-gap-analysis",
280
344
  "global-grc",
281
345
  "identity-assurance",
346
+ "incident-response-playbook",
282
347
  "pqc-first",
283
348
  "supply-chain-integrity"
284
349
  ],
@@ -291,6 +356,7 @@
291
356
  "framework-gap-analysis",
292
357
  "global-grc",
293
358
  "identity-assurance",
359
+ "incident-response-playbook",
294
360
  "kernel-lpe-triage",
295
361
  "mcp-agent-trust",
296
362
  "ot-ics-security",
@@ -301,6 +367,7 @@
301
367
  "sector-telecom": [],
302
368
  "api-security": [
303
369
  "ai-c2-detection",
370
+ "compliance-theater",
304
371
  "defensive-countermeasure-mapping",
305
372
  "dlp-gap-analysis",
306
373
  "identity-assurance",
@@ -311,7 +378,9 @@
311
378
  "ai-attack-surface",
312
379
  "ai-c2-detection",
313
380
  "api-security",
381
+ "cloud-iam-incident",
314
382
  "compliance-theater",
383
+ "container-runtime-security",
315
384
  "defensive-countermeasure-mapping",
316
385
  "dlp-gap-analysis",
317
386
  "exploit-scoring",
@@ -348,6 +417,7 @@
348
417
  "ai-attack-surface",
349
418
  "ai-risk-management",
350
419
  "cloud-security",
420
+ "compliance-theater",
351
421
  "container-runtime-security",
352
422
  "coordinated-vuln-disclosure",
353
423
  "mcp-agent-trust",
@@ -442,90 +512,90 @@
442
512
  },
443
513
  "in_degree": {
444
514
  "age-gates-child-safety": 1,
445
- "ai-attack-surface": 21,
446
- "ai-c2-detection": 11,
515
+ "ai-attack-surface": 26,
516
+ "ai-c2-detection": 12,
447
517
  "ai-risk-management": 5,
448
- "api-security": 3,
518
+ "api-security": 4,
449
519
  "attack-surface-pentest": 13,
450
- "cloud-iam-incident": 0,
520
+ "cloud-iam-incident": 1,
451
521
  "cloud-security": 5,
452
- "compliance-theater": 19,
453
- "container-runtime-security": 3,
522
+ "compliance-theater": 30,
523
+ "container-runtime-security": 4,
454
524
  "coordinated-vuln-disclosure": 12,
455
- "defensive-countermeasure-mapping": 17,
525
+ "defensive-countermeasure-mapping": 18,
456
526
  "dlp-gap-analysis": 15,
457
- "email-security-anti-phishing": 2,
458
- "exploit-scoring": 10,
459
- "framework-gap-analysis": 18,
527
+ "email-security-anti-phishing": 6,
528
+ "exploit-scoring": 11,
529
+ "framework-gap-analysis": 23,
460
530
  "fuzz-testing-strategy": 3,
461
- "global-grc": 12,
462
- "identity-assurance": 17,
463
- "idp-incident-response": 0,
464
- "incident-response-playbook": 7,
465
- "kernel-lpe-triage": 10,
466
- "mcp-agent-trust": 20,
467
- "mlops-security": 3,
531
+ "global-grc": 15,
532
+ "identity-assurance": 18,
533
+ "idp-incident-response": 1,
534
+ "incident-response-playbook": 18,
535
+ "kernel-lpe-triage": 12,
536
+ "mcp-agent-trust": 22,
537
+ "mlops-security": 6,
468
538
  "ot-ics-security": 4,
469
- "policy-exception-gen": 11,
539
+ "policy-exception-gen": 16,
470
540
  "pqc-first": 6,
471
- "rag-pipeline-security": 8,
541
+ "rag-pipeline-security": 9,
472
542
  "ransomware-response": 0,
473
543
  "researcher": 1,
474
- "sector-energy": 3,
544
+ "sector-energy": 4,
475
545
  "sector-federal-government": 6,
476
546
  "sector-financial": 8,
477
547
  "sector-healthcare": 6,
478
548
  "sector-telecom": 1,
479
549
  "security-maturity-tiers": 1,
480
550
  "skill-update-loop": 3,
481
- "supply-chain-integrity": 16,
551
+ "supply-chain-integrity": 17,
482
552
  "threat-model-currency": 6,
483
553
  "threat-modeling-methodology": 4,
484
554
  "webapp-security": 3,
485
- "zeroday-gap-learn": 7
555
+ "zeroday-gap-learn": 8
486
556
  },
487
557
  "out_degree": {
488
558
  "age-gates-child-safety": 10,
489
- "ai-attack-surface": 0,
490
- "ai-c2-detection": 5,
559
+ "ai-attack-surface": 3,
560
+ "ai-c2-detection": 7,
491
561
  "ai-risk-management": 13,
492
- "api-security": 6,
493
- "attack-surface-pentest": 1,
562
+ "api-security": 7,
563
+ "attack-surface-pentest": 4,
494
564
  "cloud-iam-incident": 14,
495
- "cloud-security": 15,
496
- "compliance-theater": 0,
565
+ "cloud-security": 17,
566
+ "compliance-theater": 12,
497
567
  "container-runtime-security": 18,
498
568
  "coordinated-vuln-disclosure": 12,
499
569
  "defensive-countermeasure-mapping": 6,
500
- "dlp-gap-analysis": 1,
570
+ "dlp-gap-analysis": 4,
501
571
  "email-security-anti-phishing": 6,
502
- "exploit-scoring": 3,
572
+ "exploit-scoring": 5,
503
573
  "framework-gap-analysis": 0,
504
- "fuzz-testing-strategy": 0,
505
- "global-grc": 0,
506
- "identity-assurance": 6,
574
+ "fuzz-testing-strategy": 2,
575
+ "global-grc": 2,
576
+ "identity-assurance": 8,
507
577
  "idp-incident-response": 12,
508
578
  "incident-response-playbook": 20,
509
- "kernel-lpe-triage": 5,
510
- "mcp-agent-trust": 5,
511
- "mlops-security": 9,
512
- "ot-ics-security": 12,
579
+ "kernel-lpe-triage": 6,
580
+ "mcp-agent-trust": 7,
581
+ "mlops-security": 10,
582
+ "ot-ics-security": 14,
513
583
  "policy-exception-gen": 0,
514
- "pqc-first": 0,
515
- "rag-pipeline-security": 5,
584
+ "pqc-first": 2,
585
+ "rag-pipeline-security": 6,
516
586
  "ransomware-response": 10,
517
587
  "researcher": 37,
518
- "sector-energy": 14,
519
- "sector-federal-government": 9,
520
- "sector-financial": 12,
521
- "sector-healthcare": 12,
588
+ "sector-energy": 15,
589
+ "sector-federal-government": 10,
590
+ "sector-financial": 14,
591
+ "sector-healthcare": 13,
522
592
  "sector-telecom": 0,
523
- "security-maturity-tiers": 0,
593
+ "security-maturity-tiers": 3,
524
594
  "skill-update-loop": 21,
525
- "supply-chain-integrity": 2,
526
- "threat-model-currency": 0,
527
- "threat-modeling-methodology": 8,
528
- "webapp-security": 8,
529
- "zeroday-gap-learn": 4
595
+ "supply-chain-integrity": 4,
596
+ "threat-model-currency": 5,
597
+ "threat-modeling-methodology": 9,
598
+ "webapp-security": 10,
599
+ "zeroday-gap-learn": 6
530
600
  }
531
601
  }