@blamejs/exceptd-skills 0.13.3 → 0.13.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (71) hide show
  1. package/AGENTS.md +41 -4
  2. package/CHANGELOG.md +64 -0
  3. package/README.md +79 -13
  4. package/bin/exceptd.js +117 -9
  5. package/data/_indexes/_meta.json +44 -44
  6. package/data/_indexes/activity-feed.json +3 -3
  7. package/data/_indexes/catalog-summaries.json +3 -3
  8. package/data/_indexes/chains.json +0 -32
  9. package/data/_indexes/handoff-dag.json +127 -57
  10. package/data/_indexes/section-offsets.json +465 -411
  11. package/data/_indexes/summary-cards.json +34 -34
  12. package/data/_indexes/token-budget.json +298 -268
  13. package/data/cve-catalog.json +4 -146
  14. package/data/exploit-availability.json +0 -27
  15. package/data/framework-control-gaps.json +2 -2
  16. package/data/playbooks/ai-discovered-cve-triage.json +1146 -0
  17. package/data/playbooks/cicd-pipeline-compromise.json +3 -0
  18. package/data/playbooks/cred-stores.json +1 -0
  19. package/data/playbooks/crypto.json +3 -0
  20. package/data/playbooks/framework.json +3 -0
  21. package/data/playbooks/idp-incident.json +2 -1
  22. package/data/playbooks/kernel.json +1 -0
  23. package/data/playbooks/mcp.json +27 -2
  24. package/data/playbooks/post-quantum-migration.json +1268 -0
  25. package/data/playbooks/runtime.json +1 -0
  26. package/data/playbooks/sbom.json +3 -0
  27. package/data/playbooks/supply-chain-recovery.json +1332 -0
  28. package/data/zeroday-lessons.json +0 -89
  29. package/lib/schemas/cve-catalog.schema.json +2 -1
  30. package/lib/schemas/playbook.schema.json +5 -0
  31. package/lib/validate-cve-catalog.js +27 -0
  32. package/manifest.json +80 -80
  33. package/orchestrator/index.js +58 -1
  34. package/package.json +1 -1
  35. package/sbom.cdx.json +99 -66
  36. package/skills/age-gates-child-safety/skill.md +2 -0
  37. package/skills/ai-attack-surface/skill.md +2 -0
  38. package/skills/ai-c2-detection/skill.md +2 -0
  39. package/skills/ai-risk-management/skill.md +2 -0
  40. package/skills/api-security/skill.md +2 -0
  41. package/skills/attack-surface-pentest/skill.md +2 -0
  42. package/skills/cloud-security/skill.md +2 -0
  43. package/skills/compliance-theater/skill.md +28 -2
  44. package/skills/container-runtime-security/skill.md +2 -0
  45. package/skills/coordinated-vuln-disclosure/skill.md +1 -1
  46. package/skills/defensive-countermeasure-mapping/skill.md +2 -0
  47. package/skills/dlp-gap-analysis/skill.md +2 -0
  48. package/skills/exploit-scoring/skill.md +30 -1
  49. package/skills/framework-gap-analysis/skill.md +28 -1
  50. package/skills/fuzz-testing-strategy/skill.md +4 -2
  51. package/skills/global-grc/skill.md +2 -0
  52. package/skills/identity-assurance/skill.md +2 -0
  53. package/skills/kernel-lpe-triage/skill.md +2 -0
  54. package/skills/mcp-agent-trust/skill.md +4 -0
  55. package/skills/mlops-security/skill.md +2 -0
  56. package/skills/ot-ics-security/skill.md +2 -0
  57. package/skills/policy-exception-gen/skill.md +28 -1
  58. package/skills/pqc-first/skill.md +2 -0
  59. package/skills/rag-pipeline-security/skill.md +2 -0
  60. package/skills/researcher/skill.md +2 -0
  61. package/skills/sector-energy/skill.md +2 -0
  62. package/skills/sector-federal-government/skill.md +2 -0
  63. package/skills/sector-financial/skill.md +2 -0
  64. package/skills/sector-healthcare/skill.md +2 -0
  65. package/skills/security-maturity-tiers/skill.md +2 -0
  66. package/skills/skill-update-loop/skill.md +2 -0
  67. package/skills/supply-chain-integrity/skill.md +2 -0
  68. package/skills/threat-model-currency/skill.md +37 -1
  69. package/skills/threat-modeling-methodology/skill.md +2 -0
  70. package/skills/webapp-security/skill.md +2 -0
  71. package/skills/zeroday-gap-learn/skill.md +33 -1
@@ -55,15 +55,16 @@
55
55
  "ai_discovery_methodology": {
56
56
  "field_added": "2026-05-15",
57
57
  "agents_md_target": "Hard Rule #7 — '41% of 2025 zero-days were AI-discovered'. Catalog target rate floor: 0.40.",
58
- "current_rate": 0.15,
59
- "current_floor_enforced_by_test": 0.15,
58
+ "current_rate": 0.132,
59
+ "current_floor_enforced_by_test": 0.13,
60
60
  "ladder_to_target": [
61
+ 0.13,
61
62
  0.15,
62
63
  0.2,
63
64
  0.3,
64
65
  0.4
65
66
  ],
66
- "floor_correction_note": "v0.12.31 (cycle 11): floor dropped from 0.20 → 0.15 after the cycle-11 intake added six ai_discovered=false entries (PAN-OS, Marimo, Ivanti EPMM, Exchange OWA, Windows LNK APT28, Defender BlueHammer). All six are vendor- or threat-actor-discovered; none carry an AI-tool credit per Hard Rule #1. Catalog observed rate fell from 6/30 (0.200) to 6/36 (0.167); floor is reset below the new observed rate to keep the test honest, and a new 0.15 rung is prepended to the ladder so monotonic non-decreasing is preserved without rewriting prior rungs.",
67
+ "floor_correction_note": "v0.13.4: floor dropped from 0.15 → 0.13 after the v0.13.4 cleanup removed two stuck-draft CVEs (MAL-2026-ANTHROPIC-MCP-STDIO duplicate of CVE-2026-30623 + CVE-2026-GTIG-AI-2FA embargoed placeholder). The GTIG entry was the only ai_discovered=true of the two; catalog observed rate fell from 6/40 (0.15) to 5/38 (0.132). Floor is reset below the new observed rate to keep the test honest, and a new 0.13 rung is prepended to the ladder so monotonic non-decreasing is preserved without rewriting prior rungs. Prior correction note: v0.12.31 floor dropped 0.20 → 0.15 after the cycle-11 intake added six ai_discovered=false entries.",
67
68
  "ladder_note": "Test floor advances when each rung is exceeded with a margin (>= floor + 0.05). Surfaces incremental tightening without coincidence-passing failures.",
68
69
  "gap_explanation": "Catalog skews toward 2024 vendor-disclosed CVEs (xz-utils, runc, CRI-O, MLflow, containerd, SolarWinds, Citrix, ConnectWise) and Pwn2Own Ireland 2025 entries (Synacktiv, DEVCORE, Summoning Team, CyCraft) where AI-tooling involvement was either not used or not credited in the public disclosure. The 41% figure in AGENTS.md Hard Rule #7 reflects the broader 2025 zero-day population reported by Google Threat Intelligence Group; catalog membership is curated against a different sampling frame (operational impact + framework-coverage need) and so will lag the population-level rate.",
69
70
  "discovery_source_enum": [
@@ -2094,149 +2095,6 @@
2094
2095
  ],
2095
2096
  "related_threats_note": "MAL-2026-TANSTACK-MINI is a Mini-Shai-Hulud-wave incident (Microsoft Security Research, 2026-05-11). The framework was open-sourced 2026-05-12 (MAL-2026-SHAI-HULUD-OSS) — TanStack predates the public release by ~24h. Same threat-actor authorship class; same registry-pivot tradecraft."
2096
2097
  },
2097
- "MAL-2026-ANTHROPIC-MCP-STDIO": {
2098
- "_draft": true,
2099
- "_quarantine": true,
2100
- "_quarantine_reason": "Duplicate of CVE-2026-30623 (Anthropic MCP SDK stdio command-injection). This entry was the pre-CVE-assignment embargoed placeholder for the OX Security MCP stdio command-injection disclosure (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); the embargo lifted with the April 2026 vendor advisory and the issue received CVE-2026-30623. Canonical id: CVE-2026-30623. Retained as _draft: true so the validator treats it as a non-failing draft warning; downstream tooling should filter on _quarantine: true and skip these entries.",
2101
- "ai_assisted_weaponization": false,
2102
- "name": "Anthropic SDK MCP STDIO command-injection (embargoed)",
2103
- "type": "command-injection",
2104
- "cvss_score": 9,
2105
- "cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
2106
- "cisa_kev": false,
2107
- "cisa_kev_date": null,
2108
- "poc_available": false,
2109
- "poc_description": "Embargoed — operator-supplied configuration parameter reaches subprocess exec argv concatenation.",
2110
- "ai_discovered": false,
2111
- "active_exploitation": "unknown",
2112
- "active_exploitation_notes": "Embargoed disclosure pending vendor advisory.",
2113
- "affected": "Anthropic MCP-client STDIO transport in published SDK versions handling operator-configured server-spawn commands.",
2114
- "affected_versions": [
2115
- "anthropic-sdk pending-vendor-advisory"
2116
- ],
2117
- "vector": "MCP-client spawns server subprocess from operator config — argument parsing concatenates user-controlled fields into the exec argv via shell-like splitting rather than argv-array passing.",
2118
- "complexity": "low",
2119
- "patch_available": false,
2120
- "patch_required_reboot": false,
2121
- "live_patch_available": true,
2122
- "live_patch_tools": [
2123
- "Operator-side allowlist of MCP server configurations",
2124
- "Pin MCP server commands to immutable absolute paths",
2125
- "Disable user-provided MCP server config until vendor advisory lands"
2126
- ],
2127
- "vendor_update_paths": [
2128
- "Pending Anthropic SDK security release"
2129
- ],
2130
- "framework_control_gaps": {
2131
- "NIST-AI-RMF-MEASURE-2.7": "MCP-client trust boundary not specifically called out — operator-config-as-input is treated as platform-trusted.",
2132
- "OWASP-LLM-Top-10-2025-LLM05": "Improper output handling on LLM-side; this is the symmetric upstream — improper INPUT handling on transport side.",
2133
- "ISO-27001-2022-A.8.28": "Secure coding assumed in vendor SDKs without tooling to attest."
2134
- },
2135
- "atlas_refs": [
2136
- "AML.T0040"
2137
- ],
2138
- "attack_refs": [
2139
- "T1059"
2140
- ],
2141
- "rwep_score": 25,
2142
- "rwep_factors": {
2143
- "cisa_kev": 0,
2144
- "poc_available": 0,
2145
- "ai_factor": 0,
2146
- "active_exploitation": 5,
2147
- "blast_radius": 30,
2148
- "patch_available": 0,
2149
- "live_patch_available": -10,
2150
- "reboot_required": 0
2151
- },
2152
- "epss_score": null,
2153
- "epss_date": "2026-05-14",
2154
- "cwe_refs": [
2155
- "CWE-78",
2156
- "CWE-88"
2157
- ],
2158
- "source_verified": "2026-05-14",
2159
- "verification_sources": [
2160
- "https://docs.anthropic.com/security",
2161
- "https://modelcontextprotocol.io/"
2162
- ],
2163
- "last_updated": "2026-05-15",
2164
- "discovery_attribution_note": "Discovered by OX Security research team (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); part of the four-exploitation-family April 2026 MCP advisory. Named-human research; no AI-tool credited for the discovery despite the target being an AI SDK. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/.",
2165
- "rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
2166
- },
2167
- "CVE-2026-GTIG-AI-2FA": {
2168
- "_draft": true,
2169
- "_draft_reason": "Placeholder entry — affected product is unnamed under GTIG embargo and affected_versions is set to \"pending-disclosure\". The key itself is not a real CVE identifier (GTIG-tracked, no MITRE assignment yet). Hard Rule #1 fields cannot be verified against a vendor advisory until the embargo lifts and a real CVE id is assigned. Re-triage once GTIG/MITRE publishes the canonical id and affected-product list.",
2170
- "name": "GTIG-tracked AI-built 2FA-bypass zero-day (placeholder)",
2171
- "type": "auth-bypass",
2172
- "cvss_score": 8.1,
2173
- "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
2174
- "cisa_kev": false,
2175
- "cisa_kev_date": null,
2176
- "poc_available": false,
2177
- "poc_description": "Embargoed — GTIG 2026-05-11 report references in-the-wild exploitation by a financially motivated threat actor using AI-built exploit code targeting an unnamed enterprise 2FA service.",
2178
- "ai_discovered": true,
2179
- "ai_discovery_notes": "First documented case of a fully AI-BUILT zero-day exploit observed in-the-wild.",
2180
- "ai_assisted_weaponization": true,
2181
- "ai_assisted_notes": "Per GTIG attribution analysis — exploit code structure consistent with AI-generated output.",
2182
- "active_exploitation": "confirmed",
2183
- "affected": "Unnamed enterprise 2FA service per GTIG embargo; placeholder entry pending CVE assignment.",
2184
- "affected_versions": [
2185
- "pending-disclosure"
2186
- ],
2187
- "vector": "Authentication state-machine confusion — exploit payload bypasses second-factor challenge by manipulating session token at the post-primary-auth / pre-2FA-challenge boundary.",
2188
- "complexity": "moderate",
2189
- "patch_available": false,
2190
- "patch_required_reboot": false,
2191
- "live_patch_available": true,
2192
- "live_patch_tools": [
2193
- "Vendor-side rate-limiting on 2FA challenge endpoint",
2194
- "Anomaly detection on session-token mutation between auth phases",
2195
- "Out-of-band MFA fallback"
2196
- ],
2197
- "vendor_update_paths": [
2198
- "Pending vendor advisory"
2199
- ],
2200
- "framework_control_gaps": {
2201
- "NIST-AI-RMF-MEASURE-2.7": "AI-discovered + AI-built exploit class not anchored in any framework.",
2202
- "NIS2-Art21-incident-handling": "EU NIS2 incident-handling SLA does not differentiate AI-built vs human-built exploit class.",
2203
- "ISO-27001-2022-A.5.7": "Threat intelligence control does not specifically require AI-attack-development feeds.",
2204
- "FedRAMP-IA-2": "MFA requirement satisfied on paper; AI-built bypass operates at a layer below the MFA control surface.",
2205
- "EU-AI-Act-Art-15": "AI Act robustness requirement applies to AI SYSTEMS not to defending against AI-built attacks."
2206
- },
2207
- "atlas_refs": [
2208
- "AML.T0040",
2209
- "AML.T0051"
2210
- ],
2211
- "attack_refs": [
2212
- "T1078",
2213
- "T1556"
2214
- ],
2215
- "rwep_score": 55,
2216
- "rwep_factors": {
2217
- "cisa_kev": 0,
2218
- "poc_available": 0,
2219
- "ai_factor": 15,
2220
- "active_exploitation": 20,
2221
- "blast_radius": 30,
2222
- "patch_available": 0,
2223
- "live_patch_available": -10,
2224
- "reboot_required": 0
2225
- },
2226
- "epss_score": null,
2227
- "epss_date": "2026-05-14",
2228
- "cwe_refs": [
2229
- "CWE-287"
2230
- ],
2231
- "source_verified": "2026-05-14",
2232
- "verification_sources": [
2233
- "https://cloud.google.com/blog/topics/threat-intelligence/",
2234
- "https://services.google.com/fh/files/misc/gtig-2026-ai-attack-trends.pdf"
2235
- ],
2236
- "last_updated": "2026-05-15",
2237
- "discovery_attribution_note": "AI-developed zero-day per Google Threat Intelligence Group 2026-05-11 disclosure; first publicly-attributed in-the-wild AI-built zero-day exploit. GTIG assesses with high confidence that an LLM was weaponized to facilitate discovery + weaponization of a 2FA bypass in a popular open-source web administration tool. Source: https://cloud.google.com/blog/topics/threat-intelligence/ai-vulnerability-exploitation-initial-access and https://thehackernews.com/2026/05/hackers-used-ai-to-develop-first-known.html.",
2238
- "rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
2239
- },
2240
2098
  "CVE-2026-30623": {
2241
2099
  "ai_assisted_weaponization": false,
2242
2100
  "name": "Anthropic MCP SDK stdio command-injection",
@@ -287,33 +287,6 @@
287
287
  "last_verified": "2026-05-15",
288
288
  "verification_source": "TanStack security advisory 2026-05-11, npm advisories"
289
289
  },
290
- "MAL-2026-ANTHROPIC-MCP-STDIO": {
291
- "poc_status": "private",
292
- "poc_description": "Embargoed reproduction in vendor channel; operator-side mitigations published while CVE assignment is pending.",
293
- "weaponization_stage": "partially_weaponized",
294
- "ai_discovery_confirmed": false,
295
- "ai_discovery_source": "vendor_research",
296
- "ai_assist_factor": "moderate",
297
- "ai_assisted_weaponization": false,
298
- "exploit_complexity": "low",
299
- "active_exploitation": "unknown",
300
- "last_verified": "2026-05-15",
301
- "verification_source": "Anthropic security channel, MCP project advisory"
302
- },
303
- "CVE-2026-GTIG-AI-2FA": {
304
- "poc_status": "private",
305
- "poc_description": "Embargoed per GTIG. AI-built exploit code observed in-the-wild against an unnamed enterprise 2FA service.",
306
- "weaponization_stage": "fully_weaponized",
307
- "ai_discovery_confirmed": true,
308
- "ai_discovery_source": "threat_actor_ai_built",
309
- "ai_assist_factor": "very_high",
310
- "ai_discovery_notes": "First documented case of a fully AI-BUILT zero-day exploit observed in-the-wild — threat actor used a frontier LLM to construct the auth-state-confusion payload.",
311
- "ai_assisted_weaponization": true,
312
- "exploit_complexity": "moderate",
313
- "active_exploitation": "confirmed",
314
- "last_verified": "2026-05-15",
315
- "verification_source": "GTIG 2026-05-11 report, Google Cloud Threat Intelligence"
316
- },
317
290
  "CVE-2026-30623": {
318
291
  "poc_status": "public",
319
292
  "poc_description": "Public advisory documents the argv-string concatenation in MCP-client stdio transport; researcher-published PoC chains operator-config to shell-meta injection.",
@@ -4600,8 +4600,8 @@
4600
4600
  "designed_for": "MEASURE function 2.7 — evaluating AI system security and resilience including assessment of risks from adversarial inputs, data poisoning, model extraction, and supply chain compromise. Anchored on the assumption that AI-system security is a measurable property of the deployed system within the boundaries the deployer controls (the model, the training corpus, the inference endpoint).",
4601
4601
  "misses": [
4602
4602
  "MEASURE 2.7 scopes security evaluation to the AI system itself and does not enumerate the ML-pipeline asset chain (tracking servers, experiment registries, artifact stores like MLflow CVE-2023-43472) as in-scope measurement surface, leaving the path-traversal / unauthenticated-access exposure class outside the framework's measurement frame",
4603
- "MCP-client trust boundary is not specifically addressed — MEASURE 2.7 does not require evaluation of operator-supplied MCP configuration as adversarial input, even though MCP STDIO command-injection (CVE-2026-30623, MAL-2026-ANTHROPIC-MCP-STDIO reference cases) demonstrates operator-config-as-input is an exploitable surface",
4604
- "AI-discovered + AI-built exploit classes (GTIG-tracked AI-built 2FA bypass reference case) are not anchored in any MEASURE 2.7 evaluation methodology — the framework treats AI offensive capability as out-of-scope rather than as a category requiring continuous threat-model refresh against the deployed AI system's defensive measurements"
4603
+ "MCP-client trust boundary is not specifically addressed — MEASURE 2.7 does not require evaluation of operator-supplied MCP configuration as adversarial input, even though MCP STDIO command-injection (CVE-2026-30623 reference case) demonstrates operator-config-as-input is an exploitable surface",
4604
+ "AI-discovered + AI-built exploit classes are not anchored in any MEASURE 2.7 evaluation methodology — the framework treats AI offensive capability as out-of-scope rather than as a category requiring continuous threat-model refresh against the deployed AI system's defensive measurements"
4605
4605
  ],
4606
4606
  "real_requirement": "MEASURE 2.7 implementations must extend the security-evaluation scope to: (1) the complete ML-pipeline asset chain including tracking servers, experiment registries, and artifact stores with explicit authentication-and-path-canonicalization testing, (2) MCP-client trust-boundary evaluation treating operator-supplied configuration as adversarial input with command-injection testing on the STDIO / SSE transports, (3) continuous threat-model refresh against AI-discovered and AI-built exploit classes with a defined cadence for refreshing measurement methodology when GTIG / Project Zero / equivalent surface AI-offensive-capability advances.",
4607
4607
  "status": "open",