@blamejs/exceptd-skills 0.9.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (136) hide show
  1. package/AGENTS.md +232 -0
  2. package/ARCHITECTURE.md +267 -0
  3. package/CHANGELOG.md +616 -0
  4. package/CONTEXT.md +203 -0
  5. package/LICENSE +200 -0
  6. package/NOTICE +82 -0
  7. package/README.md +307 -0
  8. package/SECURITY.md +73 -0
  9. package/agents/README.md +81 -0
  10. package/agents/report-generator.md +156 -0
  11. package/agents/skill-updater.md +102 -0
  12. package/agents/source-validator.md +119 -0
  13. package/agents/threat-researcher.md +149 -0
  14. package/bin/exceptd.js +183 -0
  15. package/data/_indexes/_meta.json +88 -0
  16. package/data/_indexes/activity-feed.json +362 -0
  17. package/data/_indexes/catalog-summaries.json +229 -0
  18. package/data/_indexes/chains.json +7135 -0
  19. package/data/_indexes/currency.json +359 -0
  20. package/data/_indexes/did-ladders.json +451 -0
  21. package/data/_indexes/frequency.json +2072 -0
  22. package/data/_indexes/handoff-dag.json +476 -0
  23. package/data/_indexes/jurisdiction-clocks.json +967 -0
  24. package/data/_indexes/jurisdiction-map.json +536 -0
  25. package/data/_indexes/recipes.json +319 -0
  26. package/data/_indexes/section-offsets.json +3656 -0
  27. package/data/_indexes/stale-content.json +14 -0
  28. package/data/_indexes/summary-cards.json +1736 -0
  29. package/data/_indexes/theater-fingerprints.json +381 -0
  30. package/data/_indexes/token-budget.json +2137 -0
  31. package/data/_indexes/trigger-table.json +1374 -0
  32. package/data/_indexes/xref.json +818 -0
  33. package/data/atlas-ttps.json +282 -0
  34. package/data/cve-catalog.json +496 -0
  35. package/data/cwe-catalog.json +1017 -0
  36. package/data/d3fend-catalog.json +738 -0
  37. package/data/dlp-controls.json +1039 -0
  38. package/data/exploit-availability.json +67 -0
  39. package/data/framework-control-gaps.json +1255 -0
  40. package/data/global-frameworks.json +2913 -0
  41. package/data/rfc-references.json +324 -0
  42. package/data/zeroday-lessons.json +377 -0
  43. package/keys/public.pem +3 -0
  44. package/lib/framework-gap.js +328 -0
  45. package/lib/job-queue.js +195 -0
  46. package/lib/lint-skills.js +536 -0
  47. package/lib/prefetch.js +372 -0
  48. package/lib/refresh-external.js +713 -0
  49. package/lib/schemas/cve-catalog.schema.json +151 -0
  50. package/lib/schemas/manifest.schema.json +106 -0
  51. package/lib/schemas/skill-frontmatter.schema.json +113 -0
  52. package/lib/scoring.js +149 -0
  53. package/lib/sign.js +197 -0
  54. package/lib/ttp-mapper.js +80 -0
  55. package/lib/validate-catalog-meta.js +198 -0
  56. package/lib/validate-cve-catalog.js +213 -0
  57. package/lib/validate-indexes.js +83 -0
  58. package/lib/validate-package.js +162 -0
  59. package/lib/validate-vendor.js +85 -0
  60. package/lib/verify.js +216 -0
  61. package/lib/worker-pool.js +84 -0
  62. package/manifest-snapshot.json +1833 -0
  63. package/manifest.json +2108 -0
  64. package/orchestrator/README.md +124 -0
  65. package/orchestrator/dispatcher.js +140 -0
  66. package/orchestrator/event-bus.js +146 -0
  67. package/orchestrator/index.js +874 -0
  68. package/orchestrator/pipeline.js +201 -0
  69. package/orchestrator/scanner.js +327 -0
  70. package/orchestrator/scheduler.js +137 -0
  71. package/package.json +113 -0
  72. package/sbom.cdx.json +158 -0
  73. package/scripts/audit-cross-skill.js +261 -0
  74. package/scripts/audit-perf.js +160 -0
  75. package/scripts/bootstrap.js +205 -0
  76. package/scripts/build-indexes.js +721 -0
  77. package/scripts/builders/activity-feed.js +79 -0
  78. package/scripts/builders/catalog-summaries.js +67 -0
  79. package/scripts/builders/currency.js +109 -0
  80. package/scripts/builders/cwe-chains.js +105 -0
  81. package/scripts/builders/did-ladders.js +149 -0
  82. package/scripts/builders/frequency.js +89 -0
  83. package/scripts/builders/jurisdiction-clocks.js +126 -0
  84. package/scripts/builders/recipes.js +159 -0
  85. package/scripts/builders/section-offsets.js +162 -0
  86. package/scripts/builders/stale-content.js +171 -0
  87. package/scripts/builders/summary-cards.js +166 -0
  88. package/scripts/builders/theater-fingerprints.js +198 -0
  89. package/scripts/builders/token-budget.js +96 -0
  90. package/scripts/check-manifest-snapshot.js +217 -0
  91. package/scripts/predeploy.js +267 -0
  92. package/scripts/refresh-manifest-snapshot.js +57 -0
  93. package/scripts/refresh-sbom.js +222 -0
  94. package/skills/age-gates-child-safety/skill.md +456 -0
  95. package/skills/ai-attack-surface/skill.md +282 -0
  96. package/skills/ai-c2-detection/skill.md +440 -0
  97. package/skills/ai-risk-management/skill.md +311 -0
  98. package/skills/api-security/skill.md +287 -0
  99. package/skills/attack-surface-pentest/skill.md +381 -0
  100. package/skills/cloud-security/skill.md +384 -0
  101. package/skills/compliance-theater/skill.md +365 -0
  102. package/skills/container-runtime-security/skill.md +379 -0
  103. package/skills/coordinated-vuln-disclosure/skill.md +473 -0
  104. package/skills/defensive-countermeasure-mapping/skill.md +300 -0
  105. package/skills/dlp-gap-analysis/skill.md +337 -0
  106. package/skills/email-security-anti-phishing/skill.md +206 -0
  107. package/skills/exploit-scoring/skill.md +331 -0
  108. package/skills/framework-gap-analysis/skill.md +374 -0
  109. package/skills/fuzz-testing-strategy/skill.md +313 -0
  110. package/skills/global-grc/skill.md +564 -0
  111. package/skills/identity-assurance/skill.md +272 -0
  112. package/skills/incident-response-playbook/skill.md +546 -0
  113. package/skills/kernel-lpe-triage/skill.md +303 -0
  114. package/skills/mcp-agent-trust/skill.md +326 -0
  115. package/skills/mlops-security/skill.md +325 -0
  116. package/skills/ot-ics-security/skill.md +340 -0
  117. package/skills/policy-exception-gen/skill.md +437 -0
  118. package/skills/pqc-first/skill.md +546 -0
  119. package/skills/rag-pipeline-security/skill.md +294 -0
  120. package/skills/researcher/skill.md +310 -0
  121. package/skills/sector-energy/skill.md +409 -0
  122. package/skills/sector-federal-government/skill.md +302 -0
  123. package/skills/sector-financial/skill.md +398 -0
  124. package/skills/sector-healthcare/skill.md +373 -0
  125. package/skills/security-maturity-tiers/skill.md +464 -0
  126. package/skills/skill-update-loop/skill.md +463 -0
  127. package/skills/supply-chain-integrity/skill.md +318 -0
  128. package/skills/threat-model-currency/skill.md +404 -0
  129. package/skills/threat-modeling-methodology/skill.md +312 -0
  130. package/skills/webapp-security/skill.md +281 -0
  131. package/skills/zeroday-gap-learn/skill.md +350 -0
  132. package/vendor/blamejs/LICENSE +201 -0
  133. package/vendor/blamejs/README.md +54 -0
  134. package/vendor/blamejs/_PROVENANCE.json +54 -0
  135. package/vendor/blamejs/retry.js +335 -0
  136. package/vendor/blamejs/worker-pool.js +418 -0
@@ -0,0 +1,319 @@
1
+ {
2
+ "_meta": {
3
+ "schema_version": "1.0.0",
4
+ "note": "Curated skill sequences for common operator use cases. Each step is a vetted skill plus the reason it belongs in the chain. Cross-reference token-budget.json to estimate context cost.",
5
+ "recipe_count": 8
6
+ },
7
+ "recipes": [
8
+ {
9
+ "id": "ai-red-team-prep",
10
+ "name": "AI Red Team Engagement Prep",
11
+ "description": "Stand up the AI security baseline before red-teaming a model or AI feature. Covers attack surface, MCP plugin trust, prompt-injection class, agentic actions, RAG provenance.",
12
+ "when_to_use": "Before scoping or executing a red-team engagement against a model, agentic system, or AI feature.",
13
+ "typical_jurisdictions": [
14
+ "US",
15
+ "EU",
16
+ "UK",
17
+ "GLOBAL"
18
+ ],
19
+ "steps": [
20
+ {
21
+ "skill": "ai-attack-surface",
22
+ "why": "Comprehensive attack-surface inventory mapped to ATLAS v5.1.0 with gap flags."
23
+ },
24
+ {
25
+ "skill": "ai-c2-detection",
26
+ "why": "Detection coverage for AI-as-C2 (PROMPTFLUX / SesameOp / AI-API egress) before testing."
27
+ },
28
+ {
29
+ "skill": "mcp-agent-trust",
30
+ "why": "MCP server trust boundary for the engineering toolchain side of the surface."
31
+ },
32
+ {
33
+ "skill": "rag-pipeline-security",
34
+ "why": "RAG ingestion provenance + prompt-injection chain coverage."
35
+ },
36
+ {
37
+ "skill": "threat-modeling-methodology",
38
+ "why": "Frame the engagement scope using a current methodology (PASTA/LINDDUN-AI variant)."
39
+ }
40
+ ],
41
+ "skill_count": 5,
42
+ "skill_chain": [
43
+ "ai-attack-surface",
44
+ "ai-c2-detection",
45
+ "mcp-agent-trust",
46
+ "rag-pipeline-security",
47
+ "threat-modeling-methodology"
48
+ ]
49
+ },
50
+ {
51
+ "id": "pci-dss-4-audit-defense",
52
+ "name": "PCI DSS 4.0 Audit Defense",
53
+ "description": "Show real coverage of PCI 4.0 sections that auditors most commonly mis-read as 'compliant'. Focus on 6.3.3, 11.4, 12.10.",
54
+ "when_to_use": "Mock audit, ROC drafting, or QSA pre-engagement review.",
55
+ "typical_jurisdictions": [
56
+ "US",
57
+ "EU",
58
+ "UK",
59
+ "AU",
60
+ "SG",
61
+ "GLOBAL"
62
+ ],
63
+ "steps": [
64
+ {
65
+ "skill": "compliance-theater",
66
+ "why": "Detect the 7 documented theater patterns that pass PCI but leave exposure."
67
+ },
68
+ {
69
+ "skill": "framework-gap-analysis",
70
+ "why": "Pre-analyzed PCI control gaps and what to substitute as compensating controls."
71
+ },
72
+ {
73
+ "skill": "incident-response-playbook",
74
+ "why": "PCI 12.10 incident-response coverage that maps to ATT&CK + AI-class incidents."
75
+ },
76
+ {
77
+ "skill": "supply-chain-integrity",
78
+ "why": "PCI 6.4 covers SDLC; supply-chain integrity covers what 6.4 omits (MCP / coding assistants)."
79
+ }
80
+ ],
81
+ "skill_count": 4,
82
+ "skill_chain": [
83
+ "compliance-theater",
84
+ "framework-gap-analysis",
85
+ "incident-response-playbook",
86
+ "supply-chain-integrity"
87
+ ]
88
+ },
89
+ {
90
+ "id": "federal-incident-response",
91
+ "name": "Federal Incident Response (FISMA + CISA + FedRAMP)",
92
+ "description": "Coordinate an incident affecting a federal system. Layered SLAs: CISA 8h, OMB M-22-09 access-control breach, FedRAMP continuous-monitoring obligations.",
93
+ "when_to_use": "Active or suspected incident on a federal-system boundary, FedRAMP CSP, or DoD/CMMC scope.",
94
+ "typical_jurisdictions": [
95
+ "US"
96
+ ],
97
+ "steps": [
98
+ {
99
+ "skill": "incident-response-playbook",
100
+ "why": "PICERL + cross-jurisdiction notification clocks (CISA 8h initial, OMB, FedRAMP)."
101
+ },
102
+ {
103
+ "skill": "sector-federal-government",
104
+ "why": "Federal-specific framework obligations (NIST 800-53, FedRAMP, CMMC, OMB memos)."
105
+ },
106
+ {
107
+ "skill": "coordinated-vuln-disclosure",
108
+ "why": "If a vulnerability triggered the incident, CVD coordination via CISA's process."
109
+ },
110
+ {
111
+ "skill": "policy-exception-gen",
112
+ "why": "Time-bound exceptions for any control bypassed under emergency response."
113
+ }
114
+ ],
115
+ "skill_count": 4,
116
+ "skill_chain": [
117
+ "incident-response-playbook",
118
+ "sector-federal-government",
119
+ "coordinated-vuln-disclosure",
120
+ "policy-exception-gen"
121
+ ]
122
+ },
123
+ {
124
+ "id": "dora-tlpt-scoping",
125
+ "name": "DORA TLPT Scoping (EU Financial Services)",
126
+ "description": "Scope a Threat-Led Penetration Test under DORA Art. 26-27 for an in-scope EU financial entity.",
127
+ "when_to_use": "Annual or triennial DORA TLPT scoping cycle, or after a critical-third-party change.",
128
+ "typical_jurisdictions": [
129
+ "EU"
130
+ ],
131
+ "steps": [
132
+ {
133
+ "skill": "sector-financial",
134
+ "why": "DORA-specific scoping requirements (Art. 26-27) and critical-function inventory."
135
+ },
136
+ {
137
+ "skill": "attack-surface-pentest",
138
+ "why": "Pen-test methodology aligned to ATT&CK Enterprise + financial-services adversary profile."
139
+ },
140
+ {
141
+ "skill": "threat-modeling-methodology",
142
+ "why": "Threat-led methodology (ATT&CK + ATLAS variants), red-team rules of engagement."
143
+ },
144
+ {
145
+ "skill": "supply-chain-integrity",
146
+ "why": "ICT third-party scope (DORA Art. 28-30) — TLPT must cover critical ICT third parties."
147
+ },
148
+ {
149
+ "skill": "incident-response-playbook",
150
+ "why": "Findings → DORA Art. 19 major-incident reporting (4h / 24h / 30d) if a real incident is uncovered."
151
+ }
152
+ ],
153
+ "skill_count": 5,
154
+ "skill_chain": [
155
+ "sector-financial",
156
+ "attack-surface-pentest",
157
+ "threat-modeling-methodology",
158
+ "supply-chain-integrity",
159
+ "incident-response-playbook"
160
+ ]
161
+ },
162
+ {
163
+ "id": "k12-edtech-privacy-review",
164
+ "name": "K-12 EdTech Privacy & Safety Review",
165
+ "description": "Review an EdTech product or pilot for a K-12 deployment. COPPA, FERPA, UK Children's Code, EU AI Act Annex III, AU eSafety, age-appropriate design.",
166
+ "when_to_use": "Procurement review for an EdTech vendor, K-12 board approval cycle, or post-deployment audit.",
167
+ "typical_jurisdictions": [
168
+ "US",
169
+ "UK",
170
+ "EU",
171
+ "AU"
172
+ ],
173
+ "steps": [
174
+ {
175
+ "skill": "age-gates-child-safety",
176
+ "why": "Age-appropriate design code, age estimation/assurance, dark-pattern audit, AI Act Annex III."
177
+ },
178
+ {
179
+ "skill": "dlp-gap-analysis",
180
+ "why": "Student record / PII flow audit; FERPA + state student-privacy laws (CA SOPIPA, NY Ed Law 2-D)."
181
+ },
182
+ {
183
+ "skill": "identity-assurance",
184
+ "why": "Auth posture for child accounts — NIST 800-63B IAL2/AAL2 mismatch for age-restricted UIs."
185
+ },
186
+ {
187
+ "skill": "compliance-theater",
188
+ "why": "K-12 vendor attestations are a known theater hotspot; surface the gaps."
189
+ },
190
+ {
191
+ "skill": "rag-pipeline-security",
192
+ "why": "If the EdTech includes any AI/LLM features (the common case), RAG + prompt-injection class."
193
+ }
194
+ ],
195
+ "skill_count": 5,
196
+ "skill_chain": [
197
+ "age-gates-child-safety",
198
+ "dlp-gap-analysis",
199
+ "identity-assurance",
200
+ "compliance-theater",
201
+ "rag-pipeline-security"
202
+ ]
203
+ },
204
+ {
205
+ "id": "ransomware-tabletop",
206
+ "name": "Ransomware Tabletop Exercise",
207
+ "description": "Run a tabletop covering modern ransomware: double-extortion, data exfiltration before encryption, OT impact, AI-assisted negotiation messages, multi-jurisdictional notification.",
208
+ "when_to_use": "Annual tabletop, post-incident replay, or executive-team readiness review.",
209
+ "typical_jurisdictions": [
210
+ "US",
211
+ "EU",
212
+ "UK",
213
+ "AU",
214
+ "CA",
215
+ "SG",
216
+ "JP",
217
+ "GLOBAL"
218
+ ],
219
+ "steps": [
220
+ {
221
+ "skill": "incident-response-playbook",
222
+ "why": "PICERL + cross-jurisdiction breach notification (GDPR 72h, NIS2 24h/72h, US state laws, NYDFS 72h)."
223
+ },
224
+ {
225
+ "skill": "sector-financial",
226
+ "why": "If financial-sector entity: ransom-payment disclosure (NYDFS 24h), DORA Art. 19, SAMA, MAS TRM."
227
+ },
228
+ {
229
+ "skill": "ot-ics-security",
230
+ "why": "If OT/critical infrastructure exposure: CIRCIA 24h, NERC CIP, IEC 62443, recovery without paying."
231
+ },
232
+ {
233
+ "skill": "email-security-anti-phishing",
234
+ "why": "Initial access vector typical of ransomware; AI-generated phishing baseline."
235
+ },
236
+ {
237
+ "skill": "defensive-countermeasure-mapping",
238
+ "why": "Map exercise findings to D3FEND countermeasures with verifiable telemetry."
239
+ }
240
+ ],
241
+ "skill_count": 5,
242
+ "skill_chain": [
243
+ "incident-response-playbook",
244
+ "sector-financial",
245
+ "ot-ics-security",
246
+ "email-security-anti-phishing",
247
+ "defensive-countermeasure-mapping"
248
+ ]
249
+ },
250
+ {
251
+ "id": "new-cve-drop-triage",
252
+ "name": "New CVE Drop Triage",
253
+ "description": "Standardized first 30 minutes after a high-impact CVE drop. RWEP score, KEV check, evidence chain, dispatched to the right specialized skill.",
254
+ "when_to_use": "Operator receives a CVE number from an advisory, news item, or vendor notice and needs to know what to do.",
255
+ "typical_jurisdictions": [
256
+ "GLOBAL"
257
+ ],
258
+ "steps": [
259
+ {
260
+ "skill": "researcher",
261
+ "why": "Entry-point dispatcher: anchors the CVE in the catalog, computes RWEP, routes to the right specialist."
262
+ },
263
+ {
264
+ "skill": "exploit-scoring",
265
+ "why": "RWEP score + factor breakdown, KEV + EPSS posture, weaponization timeline estimate."
266
+ },
267
+ {
268
+ "skill": "framework-gap-analysis",
269
+ "why": "Pre-analyzed control gaps that auditor-track frameworks have for this CVE class."
270
+ },
271
+ {
272
+ "skill": "incident-response-playbook",
273
+ "why": "If active exploitation suspected: notification clocks + PICERL kickoff."
274
+ }
275
+ ],
276
+ "skill_count": 4,
277
+ "skill_chain": [
278
+ "researcher",
279
+ "exploit-scoring",
280
+ "framework-gap-analysis",
281
+ "incident-response-playbook"
282
+ ]
283
+ },
284
+ {
285
+ "id": "open-source-dep-triage",
286
+ "name": "Open-Source Dependency Triage",
287
+ "description": "Triage a new advisory in a transitive npm/PyPI/Maven dependency: scope, SBOM, exploit-availability, action.",
288
+ "when_to_use": "Dependabot or Renovate fires a critical/high finding, or a public advisory mentions a dependency you ship.",
289
+ "typical_jurisdictions": [
290
+ "GLOBAL"
291
+ ],
292
+ "steps": [
293
+ {
294
+ "skill": "supply-chain-integrity",
295
+ "why": "SBOM scoping, transitive-dep evaluation, build-system trust, signed-attestation check."
296
+ },
297
+ {
298
+ "skill": "exploit-scoring",
299
+ "why": "RWEP + EPSS + KEV decide whether this is a 'drop everything' or 'normal cycle' patch."
300
+ },
301
+ {
302
+ "skill": "coordinated-vuln-disclosure",
303
+ "why": "If the advisory is pre-coordination, hold the disclosure until the upstream window closes."
304
+ },
305
+ {
306
+ "skill": "fuzz-testing-strategy",
307
+ "why": "If you maintain a fork or critical patch: prioritized fuzz target the bug class."
308
+ }
309
+ ],
310
+ "skill_count": 4,
311
+ "skill_chain": [
312
+ "supply-chain-integrity",
313
+ "exploit-scoring",
314
+ "coordinated-vuln-disclosure",
315
+ "fuzz-testing-strategy"
316
+ ]
317
+ }
318
+ ]
319
+ }