@blamejs/exceptd-skills 0.13.3 → 0.13.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +41 -4
- package/CHANGELOG.md +34 -0
- package/README.md +79 -13
- package/data/_indexes/_meta.json +44 -44
- package/data/_indexes/activity-feed.json +3 -3
- package/data/_indexes/catalog-summaries.json +3 -3
- package/data/_indexes/chains.json +0 -32
- package/data/_indexes/handoff-dag.json +127 -57
- package/data/_indexes/section-offsets.json +465 -411
- package/data/_indexes/summary-cards.json +34 -34
- package/data/_indexes/token-budget.json +298 -268
- package/data/cve-catalog.json +4 -146
- package/data/exploit-availability.json +0 -27
- package/data/framework-control-gaps.json +2 -2
- package/data/zeroday-lessons.json +0 -89
- package/lib/schemas/playbook.schema.json +5 -0
- package/manifest.json +80 -80
- package/package.json +1 -1
- package/sbom.cdx.json +53 -53
- package/skills/age-gates-child-safety/skill.md +2 -0
- package/skills/ai-attack-surface/skill.md +2 -0
- package/skills/ai-c2-detection/skill.md +2 -0
- package/skills/ai-risk-management/skill.md +2 -0
- package/skills/api-security/skill.md +2 -0
- package/skills/attack-surface-pentest/skill.md +2 -0
- package/skills/cloud-security/skill.md +2 -0
- package/skills/compliance-theater/skill.md +28 -2
- package/skills/container-runtime-security/skill.md +2 -0
- package/skills/coordinated-vuln-disclosure/skill.md +1 -1
- package/skills/defensive-countermeasure-mapping/skill.md +2 -0
- package/skills/dlp-gap-analysis/skill.md +2 -0
- package/skills/exploit-scoring/skill.md +30 -1
- package/skills/framework-gap-analysis/skill.md +28 -1
- package/skills/fuzz-testing-strategy/skill.md +4 -2
- package/skills/global-grc/skill.md +2 -0
- package/skills/identity-assurance/skill.md +2 -0
- package/skills/kernel-lpe-triage/skill.md +2 -0
- package/skills/mcp-agent-trust/skill.md +4 -0
- package/skills/mlops-security/skill.md +2 -0
- package/skills/ot-ics-security/skill.md +2 -0
- package/skills/policy-exception-gen/skill.md +28 -1
- package/skills/pqc-first/skill.md +2 -0
- package/skills/rag-pipeline-security/skill.md +2 -0
- package/skills/researcher/skill.md +2 -0
- package/skills/sector-energy/skill.md +2 -0
- package/skills/sector-federal-government/skill.md +2 -0
- package/skills/sector-financial/skill.md +2 -0
- package/skills/sector-healthcare/skill.md +2 -0
- package/skills/security-maturity-tiers/skill.md +2 -0
- package/skills/skill-update-loop/skill.md +2 -0
- package/skills/supply-chain-integrity/skill.md +2 -0
- package/skills/threat-model-currency/skill.md +37 -1
- package/skills/threat-modeling-methodology/skill.md +2 -0
- package/skills/webapp-security/skill.md +2 -0
- package/skills/zeroday-gap-learn/skill.md +33 -1
package/data/cve-catalog.json
CHANGED
|
@@ -55,15 +55,16 @@
|
|
|
55
55
|
"ai_discovery_methodology": {
|
|
56
56
|
"field_added": "2026-05-15",
|
|
57
57
|
"agents_md_target": "Hard Rule #7 — '41% of 2025 zero-days were AI-discovered'. Catalog target rate floor: 0.40.",
|
|
58
|
-
"current_rate": 0.
|
|
59
|
-
"current_floor_enforced_by_test": 0.
|
|
58
|
+
"current_rate": 0.132,
|
|
59
|
+
"current_floor_enforced_by_test": 0.13,
|
|
60
60
|
"ladder_to_target": [
|
|
61
|
+
0.13,
|
|
61
62
|
0.15,
|
|
62
63
|
0.2,
|
|
63
64
|
0.3,
|
|
64
65
|
0.4
|
|
65
66
|
],
|
|
66
|
-
"floor_correction_note": "v0.
|
|
67
|
+
"floor_correction_note": "v0.13.4: floor dropped from 0.15 → 0.13 after the v0.13.4 cleanup removed two stuck-draft CVEs (MAL-2026-ANTHROPIC-MCP-STDIO duplicate of CVE-2026-30623 + CVE-2026-GTIG-AI-2FA embargoed placeholder). The GTIG entry was the only ai_discovered=true of the two; catalog observed rate fell from 6/40 (0.15) to 5/38 (0.132). Floor is reset below the new observed rate to keep the test honest, and a new 0.13 rung is prepended to the ladder so monotonic non-decreasing is preserved without rewriting prior rungs. Prior correction note: v0.12.31 floor dropped 0.20 → 0.15 after the cycle-11 intake added six ai_discovered=false entries.",
|
|
67
68
|
"ladder_note": "Test floor advances when each rung is exceeded with a margin (>= floor + 0.05). Surfaces incremental tightening without coincidence-passing failures.",
|
|
68
69
|
"gap_explanation": "Catalog skews toward 2024 vendor-disclosed CVEs (xz-utils, runc, CRI-O, MLflow, containerd, SolarWinds, Citrix, ConnectWise) and Pwn2Own Ireland 2025 entries (Synacktiv, DEVCORE, Summoning Team, CyCraft) where AI-tooling involvement was either not used or not credited in the public disclosure. The 41% figure in AGENTS.md Hard Rule #7 reflects the broader 2025 zero-day population reported by Google Threat Intelligence Group; catalog membership is curated against a different sampling frame (operational impact + framework-coverage need) and so will lag the population-level rate.",
|
|
69
70
|
"discovery_source_enum": [
|
|
@@ -2094,149 +2095,6 @@
|
|
|
2094
2095
|
],
|
|
2095
2096
|
"related_threats_note": "MAL-2026-TANSTACK-MINI is a Mini-Shai-Hulud-wave incident (Microsoft Security Research, 2026-05-11). The framework was open-sourced 2026-05-12 (MAL-2026-SHAI-HULUD-OSS) — TanStack predates the public release by ~24h. Same threat-actor authorship class; same registry-pivot tradecraft."
|
|
2096
2097
|
},
|
|
2097
|
-
"MAL-2026-ANTHROPIC-MCP-STDIO": {
|
|
2098
|
-
"_draft": true,
|
|
2099
|
-
"_quarantine": true,
|
|
2100
|
-
"_quarantine_reason": "Duplicate of CVE-2026-30623 (Anthropic MCP SDK stdio command-injection). This entry was the pre-CVE-assignment embargoed placeholder for the OX Security MCP stdio command-injection disclosure (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); the embargo lifted with the April 2026 vendor advisory and the issue received CVE-2026-30623. Canonical id: CVE-2026-30623. Retained as _draft: true so the validator treats it as a non-failing draft warning; downstream tooling should filter on _quarantine: true and skip these entries.",
|
|
2101
|
-
"ai_assisted_weaponization": false,
|
|
2102
|
-
"name": "Anthropic SDK MCP STDIO command-injection (embargoed)",
|
|
2103
|
-
"type": "command-injection",
|
|
2104
|
-
"cvss_score": 9,
|
|
2105
|
-
"cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
|
2106
|
-
"cisa_kev": false,
|
|
2107
|
-
"cisa_kev_date": null,
|
|
2108
|
-
"poc_available": false,
|
|
2109
|
-
"poc_description": "Embargoed — operator-supplied configuration parameter reaches subprocess exec argv concatenation.",
|
|
2110
|
-
"ai_discovered": false,
|
|
2111
|
-
"active_exploitation": "unknown",
|
|
2112
|
-
"active_exploitation_notes": "Embargoed disclosure pending vendor advisory.",
|
|
2113
|
-
"affected": "Anthropic MCP-client STDIO transport in published SDK versions handling operator-configured server-spawn commands.",
|
|
2114
|
-
"affected_versions": [
|
|
2115
|
-
"anthropic-sdk pending-vendor-advisory"
|
|
2116
|
-
],
|
|
2117
|
-
"vector": "MCP-client spawns server subprocess from operator config — argument parsing concatenates user-controlled fields into the exec argv via shell-like splitting rather than argv-array passing.",
|
|
2118
|
-
"complexity": "low",
|
|
2119
|
-
"patch_available": false,
|
|
2120
|
-
"patch_required_reboot": false,
|
|
2121
|
-
"live_patch_available": true,
|
|
2122
|
-
"live_patch_tools": [
|
|
2123
|
-
"Operator-side allowlist of MCP server configurations",
|
|
2124
|
-
"Pin MCP server commands to immutable absolute paths",
|
|
2125
|
-
"Disable user-provided MCP server config until vendor advisory lands"
|
|
2126
|
-
],
|
|
2127
|
-
"vendor_update_paths": [
|
|
2128
|
-
"Pending Anthropic SDK security release"
|
|
2129
|
-
],
|
|
2130
|
-
"framework_control_gaps": {
|
|
2131
|
-
"NIST-AI-RMF-MEASURE-2.7": "MCP-client trust boundary not specifically called out — operator-config-as-input is treated as platform-trusted.",
|
|
2132
|
-
"OWASP-LLM-Top-10-2025-LLM05": "Improper output handling on LLM-side; this is the symmetric upstream — improper INPUT handling on transport side.",
|
|
2133
|
-
"ISO-27001-2022-A.8.28": "Secure coding assumed in vendor SDKs without tooling to attest."
|
|
2134
|
-
},
|
|
2135
|
-
"atlas_refs": [
|
|
2136
|
-
"AML.T0040"
|
|
2137
|
-
],
|
|
2138
|
-
"attack_refs": [
|
|
2139
|
-
"T1059"
|
|
2140
|
-
],
|
|
2141
|
-
"rwep_score": 25,
|
|
2142
|
-
"rwep_factors": {
|
|
2143
|
-
"cisa_kev": 0,
|
|
2144
|
-
"poc_available": 0,
|
|
2145
|
-
"ai_factor": 0,
|
|
2146
|
-
"active_exploitation": 5,
|
|
2147
|
-
"blast_radius": 30,
|
|
2148
|
-
"patch_available": 0,
|
|
2149
|
-
"live_patch_available": -10,
|
|
2150
|
-
"reboot_required": 0
|
|
2151
|
-
},
|
|
2152
|
-
"epss_score": null,
|
|
2153
|
-
"epss_date": "2026-05-14",
|
|
2154
|
-
"cwe_refs": [
|
|
2155
|
-
"CWE-78",
|
|
2156
|
-
"CWE-88"
|
|
2157
|
-
],
|
|
2158
|
-
"source_verified": "2026-05-14",
|
|
2159
|
-
"verification_sources": [
|
|
2160
|
-
"https://docs.anthropic.com/security",
|
|
2161
|
-
"https://modelcontextprotocol.io/"
|
|
2162
|
-
],
|
|
2163
|
-
"last_updated": "2026-05-15",
|
|
2164
|
-
"discovery_attribution_note": "Discovered by OX Security research team (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); part of the four-exploitation-family April 2026 MCP advisory. Named-human research; no AI-tool credited for the discovery despite the target being an AI SDK. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/.",
|
|
2165
|
-
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2166
|
-
},
|
|
2167
|
-
"CVE-2026-GTIG-AI-2FA": {
|
|
2168
|
-
"_draft": true,
|
|
2169
|
-
"_draft_reason": "Placeholder entry — affected product is unnamed under GTIG embargo and affected_versions is set to \"pending-disclosure\". The key itself is not a real CVE identifier (GTIG-tracked, no MITRE assignment yet). Hard Rule #1 fields cannot be verified against a vendor advisory until the embargo lifts and a real CVE id is assigned. Re-triage once GTIG/MITRE publishes the canonical id and affected-product list.",
|
|
2170
|
-
"name": "GTIG-tracked AI-built 2FA-bypass zero-day (placeholder)",
|
|
2171
|
-
"type": "auth-bypass",
|
|
2172
|
-
"cvss_score": 8.1,
|
|
2173
|
-
"cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
2174
|
-
"cisa_kev": false,
|
|
2175
|
-
"cisa_kev_date": null,
|
|
2176
|
-
"poc_available": false,
|
|
2177
|
-
"poc_description": "Embargoed — GTIG 2026-05-11 report references in-the-wild exploitation by a financially motivated threat actor using AI-built exploit code targeting an unnamed enterprise 2FA service.",
|
|
2178
|
-
"ai_discovered": true,
|
|
2179
|
-
"ai_discovery_notes": "First documented case of a fully AI-BUILT zero-day exploit observed in-the-wild.",
|
|
2180
|
-
"ai_assisted_weaponization": true,
|
|
2181
|
-
"ai_assisted_notes": "Per GTIG attribution analysis — exploit code structure consistent with AI-generated output.",
|
|
2182
|
-
"active_exploitation": "confirmed",
|
|
2183
|
-
"affected": "Unnamed enterprise 2FA service per GTIG embargo; placeholder entry pending CVE assignment.",
|
|
2184
|
-
"affected_versions": [
|
|
2185
|
-
"pending-disclosure"
|
|
2186
|
-
],
|
|
2187
|
-
"vector": "Authentication state-machine confusion — exploit payload bypasses second-factor challenge by manipulating session token at the post-primary-auth / pre-2FA-challenge boundary.",
|
|
2188
|
-
"complexity": "moderate",
|
|
2189
|
-
"patch_available": false,
|
|
2190
|
-
"patch_required_reboot": false,
|
|
2191
|
-
"live_patch_available": true,
|
|
2192
|
-
"live_patch_tools": [
|
|
2193
|
-
"Vendor-side rate-limiting on 2FA challenge endpoint",
|
|
2194
|
-
"Anomaly detection on session-token mutation between auth phases",
|
|
2195
|
-
"Out-of-band MFA fallback"
|
|
2196
|
-
],
|
|
2197
|
-
"vendor_update_paths": [
|
|
2198
|
-
"Pending vendor advisory"
|
|
2199
|
-
],
|
|
2200
|
-
"framework_control_gaps": {
|
|
2201
|
-
"NIST-AI-RMF-MEASURE-2.7": "AI-discovered + AI-built exploit class not anchored in any framework.",
|
|
2202
|
-
"NIS2-Art21-incident-handling": "EU NIS2 incident-handling SLA does not differentiate AI-built vs human-built exploit class.",
|
|
2203
|
-
"ISO-27001-2022-A.5.7": "Threat intelligence control does not specifically require AI-attack-development feeds.",
|
|
2204
|
-
"FedRAMP-IA-2": "MFA requirement satisfied on paper; AI-built bypass operates at a layer below the MFA control surface.",
|
|
2205
|
-
"EU-AI-Act-Art-15": "AI Act robustness requirement applies to AI SYSTEMS not to defending against AI-built attacks."
|
|
2206
|
-
},
|
|
2207
|
-
"atlas_refs": [
|
|
2208
|
-
"AML.T0040",
|
|
2209
|
-
"AML.T0051"
|
|
2210
|
-
],
|
|
2211
|
-
"attack_refs": [
|
|
2212
|
-
"T1078",
|
|
2213
|
-
"T1556"
|
|
2214
|
-
],
|
|
2215
|
-
"rwep_score": 55,
|
|
2216
|
-
"rwep_factors": {
|
|
2217
|
-
"cisa_kev": 0,
|
|
2218
|
-
"poc_available": 0,
|
|
2219
|
-
"ai_factor": 15,
|
|
2220
|
-
"active_exploitation": 20,
|
|
2221
|
-
"blast_radius": 30,
|
|
2222
|
-
"patch_available": 0,
|
|
2223
|
-
"live_patch_available": -10,
|
|
2224
|
-
"reboot_required": 0
|
|
2225
|
-
},
|
|
2226
|
-
"epss_score": null,
|
|
2227
|
-
"epss_date": "2026-05-14",
|
|
2228
|
-
"cwe_refs": [
|
|
2229
|
-
"CWE-287"
|
|
2230
|
-
],
|
|
2231
|
-
"source_verified": "2026-05-14",
|
|
2232
|
-
"verification_sources": [
|
|
2233
|
-
"https://cloud.google.com/blog/topics/threat-intelligence/",
|
|
2234
|
-
"https://services.google.com/fh/files/misc/gtig-2026-ai-attack-trends.pdf"
|
|
2235
|
-
],
|
|
2236
|
-
"last_updated": "2026-05-15",
|
|
2237
|
-
"discovery_attribution_note": "AI-developed zero-day per Google Threat Intelligence Group 2026-05-11 disclosure; first publicly-attributed in-the-wild AI-built zero-day exploit. GTIG assesses with high confidence that an LLM was weaponized to facilitate discovery + weaponization of a 2FA bypass in a popular open-source web administration tool. Source: https://cloud.google.com/blog/topics/threat-intelligence/ai-vulnerability-exploitation-initial-access and https://thehackernews.com/2026/05/hackers-used-ai-to-develop-first-known.html.",
|
|
2238
|
-
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2239
|
-
},
|
|
2240
2098
|
"CVE-2026-30623": {
|
|
2241
2099
|
"ai_assisted_weaponization": false,
|
|
2242
2100
|
"name": "Anthropic MCP SDK stdio command-injection",
|
|
@@ -287,33 +287,6 @@
|
|
|
287
287
|
"last_verified": "2026-05-15",
|
|
288
288
|
"verification_source": "TanStack security advisory 2026-05-11, npm advisories"
|
|
289
289
|
},
|
|
290
|
-
"MAL-2026-ANTHROPIC-MCP-STDIO": {
|
|
291
|
-
"poc_status": "private",
|
|
292
|
-
"poc_description": "Embargoed reproduction in vendor channel; operator-side mitigations published while CVE assignment is pending.",
|
|
293
|
-
"weaponization_stage": "partially_weaponized",
|
|
294
|
-
"ai_discovery_confirmed": false,
|
|
295
|
-
"ai_discovery_source": "vendor_research",
|
|
296
|
-
"ai_assist_factor": "moderate",
|
|
297
|
-
"ai_assisted_weaponization": false,
|
|
298
|
-
"exploit_complexity": "low",
|
|
299
|
-
"active_exploitation": "unknown",
|
|
300
|
-
"last_verified": "2026-05-15",
|
|
301
|
-
"verification_source": "Anthropic security channel, MCP project advisory"
|
|
302
|
-
},
|
|
303
|
-
"CVE-2026-GTIG-AI-2FA": {
|
|
304
|
-
"poc_status": "private",
|
|
305
|
-
"poc_description": "Embargoed per GTIG. AI-built exploit code observed in-the-wild against an unnamed enterprise 2FA service.",
|
|
306
|
-
"weaponization_stage": "fully_weaponized",
|
|
307
|
-
"ai_discovery_confirmed": true,
|
|
308
|
-
"ai_discovery_source": "threat_actor_ai_built",
|
|
309
|
-
"ai_assist_factor": "very_high",
|
|
310
|
-
"ai_discovery_notes": "First documented case of a fully AI-BUILT zero-day exploit observed in-the-wild — threat actor used a frontier LLM to construct the auth-state-confusion payload.",
|
|
311
|
-
"ai_assisted_weaponization": true,
|
|
312
|
-
"exploit_complexity": "moderate",
|
|
313
|
-
"active_exploitation": "confirmed",
|
|
314
|
-
"last_verified": "2026-05-15",
|
|
315
|
-
"verification_source": "GTIG 2026-05-11 report, Google Cloud Threat Intelligence"
|
|
316
|
-
},
|
|
317
290
|
"CVE-2026-30623": {
|
|
318
291
|
"poc_status": "public",
|
|
319
292
|
"poc_description": "Public advisory documents the argv-string concatenation in MCP-client stdio transport; researcher-published PoC chains operator-config to shell-meta injection.",
|
|
@@ -4600,8 +4600,8 @@
|
|
|
4600
4600
|
"designed_for": "MEASURE function 2.7 — evaluating AI system security and resilience including assessment of risks from adversarial inputs, data poisoning, model extraction, and supply chain compromise. Anchored on the assumption that AI-system security is a measurable property of the deployed system within the boundaries the deployer controls (the model, the training corpus, the inference endpoint).",
|
|
4601
4601
|
"misses": [
|
|
4602
4602
|
"MEASURE 2.7 scopes security evaluation to the AI system itself and does not enumerate the ML-pipeline asset chain (tracking servers, experiment registries, artifact stores like MLflow CVE-2023-43472) as in-scope measurement surface, leaving the path-traversal / unauthenticated-access exposure class outside the framework's measurement frame",
|
|
4603
|
-
"MCP-client trust boundary is not specifically addressed — MEASURE 2.7 does not require evaluation of operator-supplied MCP configuration as adversarial input, even though MCP STDIO command-injection (CVE-2026-30623
|
|
4604
|
-
"AI-discovered + AI-built exploit classes
|
|
4603
|
+
"MCP-client trust boundary is not specifically addressed — MEASURE 2.7 does not require evaluation of operator-supplied MCP configuration as adversarial input, even though MCP STDIO command-injection (CVE-2026-30623 reference case) demonstrates operator-config-as-input is an exploitable surface",
|
|
4604
|
+
"AI-discovered + AI-built exploit classes are not anchored in any MEASURE 2.7 evaluation methodology — the framework treats AI offensive capability as out-of-scope rather than as a category requiring continuous threat-model refresh against the deployed AI system's defensive measurements"
|
|
4605
4605
|
],
|
|
4606
4606
|
"real_requirement": "MEASURE 2.7 implementations must extend the security-evaluation scope to: (1) the complete ML-pipeline asset chain including tracking servers, experiment registries, and artifact stores with explicit authentication-and-path-canonicalization testing, (2) MCP-client trust-boundary evaluation treating operator-supplied configuration as adversarial input with command-injection testing on the STDIO / SSE transports, (3) continuous threat-model refresh against AI-discovered and AI-built exploit classes with a defined cadence for refreshing measurement methodology when GTIG / Project Zero / equivalent surface AI-offensive-capability advances.",
|
|
4607
4607
|
"status": "open",
|
|
@@ -916,95 +916,6 @@
|
|
|
916
916
|
"ai_discovery_date": "2024-03-29",
|
|
917
917
|
"ai_assist_factor": "low"
|
|
918
918
|
},
|
|
919
|
-
"CVE-2026-GTIG-AI-2FA": {
|
|
920
|
-
"name": "GTIG-tracked AI-built 2FA-bypass zero-day",
|
|
921
|
-
"lesson_date": "2026-05-15",
|
|
922
|
-
"attack_vector": {
|
|
923
|
-
"description": "Authentication state-machine confusion in an unnamed enterprise 2FA service. Exploit payload bypasses the second-factor challenge by manipulating session token at the post-primary-auth / pre-2FA-challenge boundary. Notable as the first documented AI-BUILT (not just AI-discovered) zero-day observed in-the-wild — threat actor used a frontier LLM to construct the exploit payload.",
|
|
924
|
-
"privileges_required": "remote unauthenticated, requires valid primary-auth credentials (assumed phished or credential-stuffed)",
|
|
925
|
-
"complexity": "moderate to develop, low to use",
|
|
926
|
-
"ai_factor": "First documented AI-BUILT ITW zero-day per GTIG 2026-05-11. Threat actor lacked the engineering capacity to construct the payload independently; LLM-generated exploit code shows characteristic structure, comments, and idiomatic patterns. Compresses time-to-weaponize by approximately 20x relative to human-only development for this class."
|
|
927
|
-
},
|
|
928
|
-
"defense_chain": {
|
|
929
|
-
"prevention": {
|
|
930
|
-
"what_would_have_worked": "Out-of-band MFA (FIDO2 / passkey / push-with-number-match) that does not share a session-token boundary with the bypass surface. Hardware-anchored binding of primary-auth and 2FA challenge into a single signed assertion.",
|
|
931
|
-
"was_this_required": false,
|
|
932
|
-
"framework_requiring_it": null,
|
|
933
|
-
"adequacy": "Phishing-resistant MFA (NIST AAL3) would have blocked this class. Most organizations still operate at AAL2 with SMS or TOTP."
|
|
934
|
-
},
|
|
935
|
-
"detection": {
|
|
936
|
-
"what_would_have_worked": "Session-token mutation anomaly detection between auth phases — alert when the session-state machine receives an unexpected transition.",
|
|
937
|
-
"was_this_required": false,
|
|
938
|
-
"framework_requiring_it": null,
|
|
939
|
-
"adequacy": "Anomaly detection on auth-state transitions is not a standard control category in any framework. Most identity providers don't expose the necessary telemetry."
|
|
940
|
-
},
|
|
941
|
-
"response": {
|
|
942
|
-
"what_would_have_worked": "Vendor-side rate-limiting on the 2FA challenge endpoint + temporary global rollback of the 2FA flow to require fresh primary-auth.",
|
|
943
|
-
"was_this_required": false,
|
|
944
|
-
"framework_requiring_it": null,
|
|
945
|
-
"adequacy": "Embargoed CVE — public response capability constrained by disclosure timing."
|
|
946
|
-
}
|
|
947
|
-
},
|
|
948
|
-
"framework_coverage": {
|
|
949
|
-
"NIST-AI-RMF-MEASURE-2.7": {
|
|
950
|
-
"covered": false,
|
|
951
|
-
"adequate": false,
|
|
952
|
-
"gap": "AI-discovered + AI-built exploit class not anchored in any framework — neither NIST AI RMF nor ISO 42001 require AI-attack-development monitoring as a control category."
|
|
953
|
-
},
|
|
954
|
-
"NIS2-Art21-incident-handling": {
|
|
955
|
-
"covered": true,
|
|
956
|
-
"adequate": false,
|
|
957
|
-
"gap": "EU NIS2 incident-handling SLA does not differentiate AI-built vs human-built exploit class — but the AI-built class compresses time-to-weaponize by ~20x and time-to-mass-deployment by ~50x."
|
|
958
|
-
},
|
|
959
|
-
"FedRAMP-IA-2": {
|
|
960
|
-
"covered": true,
|
|
961
|
-
"adequate": false,
|
|
962
|
-
"gap": "MFA requirement satisfied on paper; AI-built bypass operates at a layer below the MFA control surface."
|
|
963
|
-
},
|
|
964
|
-
"EU-AI-Act-Art-15": {
|
|
965
|
-
"covered": false,
|
|
966
|
-
"adequate": false,
|
|
967
|
-
"gap": "AI Act robustness requirement applies to AI SYSTEMS not to defending against AI-built attacks on non-AI systems."
|
|
968
|
-
},
|
|
969
|
-
"ALL-FRAMEWORKS": {
|
|
970
|
-
"covered": false,
|
|
971
|
-
"adequate": false,
|
|
972
|
-
"gap": "No framework anchors on AI-attack-development as an operational threat that requires distinct controls. ATLAS documents the techniques but compliance frameworks haven't picked them up."
|
|
973
|
-
}
|
|
974
|
-
},
|
|
975
|
-
"new_control_requirements": [
|
|
976
|
-
{
|
|
977
|
-
"id": "NEW-CTRL-022",
|
|
978
|
-
"name": "AI-ATTACK-DEVELOPMENT-MONITORING",
|
|
979
|
-
"description": "Threat intelligence functions must subscribe to AI-attack-development feeds (GTIG, MITRE ATLAS, anthropic-internal threat reports). Treat AI-built exploit class as compressing the standard 30-day CISA KEV response window to 24 hours.",
|
|
980
|
-
"evidence": "CVE-2026-GTIG-AI-2FA — first documented AI-built ITW zero-day per GTIG 2026-05-11. Time from disclosure to mass-exploitation observed at ~10x faster than comparable non-AI-built cases.",
|
|
981
|
-
"gap_closes": [
|
|
982
|
-
"NIST-AI-RMF-MEASURE-2.7",
|
|
983
|
-
"ISO-27001-2022-A.5.7",
|
|
984
|
-
"NIS2-Art21-incident-handling"
|
|
985
|
-
]
|
|
986
|
-
},
|
|
987
|
-
{
|
|
988
|
-
"id": "NEW-CTRL-023",
|
|
989
|
-
"name": "PHISHING-RESISTANT-MFA-MANDATE",
|
|
990
|
-
"description": "AAL3 phishing-resistant MFA (FIDO2 / passkey / hardware-anchored push-with-number-match) required for all administrative and privileged access. SMS, TOTP, and push-to-approve are insufficient against AI-built session-confusion attacks.",
|
|
991
|
-
"evidence": "CVE-2026-GTIG-AI-2FA — bypass operates at the session-state-machine layer; AAL3 anchors the second factor to the primary-auth assertion cryptographically.",
|
|
992
|
-
"gap_closes": [
|
|
993
|
-
"FedRAMP-IA-2",
|
|
994
|
-
"NIST-800-63-AAL3"
|
|
995
|
-
]
|
|
996
|
-
}
|
|
997
|
-
],
|
|
998
|
-
"compliance_exposure_score": {
|
|
999
|
-
"percent_audit_passing_orgs_still_exposed": 92,
|
|
1000
|
-
"basis": "Most organizations operate at AAL2 with TOTP or SMS. AI-built attack class compresses development time by 20x — defenders have not yet caught up.",
|
|
1001
|
-
"theater_pattern": "mfa_aal2_satisfies_paper_aal3"
|
|
1002
|
-
},
|
|
1003
|
-
"ai_discovered_zeroday": true,
|
|
1004
|
-
"ai_discovery_source": "threat_actor_ai_built",
|
|
1005
|
-
"ai_discovery_date": "2026-05-11",
|
|
1006
|
-
"ai_assist_factor": "very_high"
|
|
1007
|
-
},
|
|
1008
919
|
"CVE-2026-42945": {
|
|
1009
920
|
"name": "NGINX Rift",
|
|
1010
921
|
"lesson_date": "2026-05-15",
|
|
@@ -119,6 +119,11 @@
|
|
|
119
119
|
"condition": { "type": "string", "examples": ["finding.severity == 'critical'", "theater_score < 60", "always"] }
|
|
120
120
|
}
|
|
121
121
|
}
|
|
122
|
+
},
|
|
123
|
+
"fed_by": {
|
|
124
|
+
"type": "array",
|
|
125
|
+
"description": "v0.13.0: reverse direction of feeds_into. Auto-populated by scripts/refresh-reverse-refs.js — operators reading this playbook see what chains INTO it without grepping every other playbook. Plain array of playbook ids; condition is recorded on the SOURCE playbook's feeds_into entry, not duplicated here.",
|
|
126
|
+
"items": { "type": "string" }
|
|
122
127
|
}
|
|
123
128
|
}
|
|
124
129
|
},
|