@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
|
@@ -0,0 +1,1736 @@
|
|
|
1
|
+
{
|
|
2
|
+
"_meta": {
|
|
3
|
+
"schema_version": "1.0.0",
|
|
4
|
+
"note": "Compact per-skill abstract for researcher dispatch and AI consumer planning. See scripts/builders/summary-cards.js."
|
|
5
|
+
},
|
|
6
|
+
"skills": {
|
|
7
|
+
"kernel-lpe-triage": {
|
|
8
|
+
"description": "Assess Linux kernel LPE exposure — Copy Fail, Dirty Frag, live-patch vs. reboot remediation",
|
|
9
|
+
"threat_context_excerpt": "An AI system discovered this vulnerability in approximately one hour. It is a page-cache copy-on-write (CoW) primitive in the Linux kernel affecting all major distributions since kernel 4.14 (2017). Every major Linux distribution is affected: RHEL 7–9, Ubuntu 18.04–24.04, Debian 9–12, CentOS, Fedora, Amazon Linux 2/2023, SUSE 12/15, Alpine, and derivatives.",
|
|
10
|
+
"produces": "Produce this structure:\n\n```\n## Kernel LPE Exposure Assessment\n\n**Assessment Date:** YYYY-MM-DD \n**Kernel Version:** x.x.x \n**Distribution:** [name + version]\n\n### Exposure Summary\n| CVE | Status | Severity |\n|-----|--------|----------|\n| CVE-2026-31431 (Copy Fail) | [Exposed / Live-patched / Patched] | [Critical/High/Medium/Low] |\n| CVE-2026-43284 (Dirty Frag ESP) | [Exposed / Patched] | [Critical/High/Medium/Low] |\n| CVE-2026-43500 (Dirty Frag RxRPC) | [Exposed / Patched] | [Critical/High/Medium/Low] |\n\n### IPsec Control Impact\n[If applicable: which network controls are affected by Dirty F ...",
|
|
11
|
+
"key_xrefs": {
|
|
12
|
+
"cwe_refs": [
|
|
13
|
+
"CWE-125",
|
|
14
|
+
"CWE-362",
|
|
15
|
+
"CWE-416",
|
|
16
|
+
"CWE-672",
|
|
17
|
+
"CWE-787"
|
|
18
|
+
],
|
|
19
|
+
"d3fend_refs": [
|
|
20
|
+
"D3-ASLR",
|
|
21
|
+
"D3-EAL",
|
|
22
|
+
"D3-PHRA",
|
|
23
|
+
"D3-PSEP"
|
|
24
|
+
],
|
|
25
|
+
"framework_gaps": [
|
|
26
|
+
"NIST-800-53-SI-2",
|
|
27
|
+
"ISO-27001-2022-A.8.8",
|
|
28
|
+
"PCI-DSS-4.0-6.3.3",
|
|
29
|
+
"NIS2-Art21-patch-management",
|
|
30
|
+
"NIST-800-53-SC-8",
|
|
31
|
+
"CIS-Controls-v8-Control7"
|
|
32
|
+
],
|
|
33
|
+
"atlas_refs": [],
|
|
34
|
+
"attack_refs": [
|
|
35
|
+
"T1068",
|
|
36
|
+
"T1548.001"
|
|
37
|
+
],
|
|
38
|
+
"rfc_refs": [
|
|
39
|
+
"RFC-4301",
|
|
40
|
+
"RFC-4303",
|
|
41
|
+
"RFC-7296"
|
|
42
|
+
],
|
|
43
|
+
"dlp_refs": []
|
|
44
|
+
},
|
|
45
|
+
"trigger_count": 9,
|
|
46
|
+
"atlas_count": 0,
|
|
47
|
+
"attack_count": 2,
|
|
48
|
+
"framework_gap_count": 6,
|
|
49
|
+
"cwe_count": 5,
|
|
50
|
+
"d3fend_count": 4,
|
|
51
|
+
"rfc_count": 3,
|
|
52
|
+
"last_threat_review": "2026-05-01",
|
|
53
|
+
"path": "skills/kernel-lpe-triage/skill.md",
|
|
54
|
+
"handoff_targets": [
|
|
55
|
+
"attack-surface-pentest",
|
|
56
|
+
"compliance-theater",
|
|
57
|
+
"defensive-countermeasure-mapping",
|
|
58
|
+
"exploit-scoring",
|
|
59
|
+
"policy-exception-gen"
|
|
60
|
+
]
|
|
61
|
+
},
|
|
62
|
+
"ai-attack-surface": {
|
|
63
|
+
"description": "Comprehensive AI/ML attack surface assessment mapped to MITRE ATLAS v5.1.0 with gap flags",
|
|
64
|
+
"threat_context_excerpt": "The AI attack surface is not speculative. It is actively exploited. The following are confirmed, documented threats as of mid-2026.",
|
|
65
|
+
"produces": "```\n## AI Attack Surface Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Scope:** [systems/applications assessed]\n\n### Surface Inventory\n| Component | Type | External Input | Tool Use | Risk Level |\n|-----------|------|---------------|----------|------------|\n| [name] | [LLM app / MCP server / coding assistant] | [Yes/No] | [Yes/No] | [Critical/High/Medium/Low] |\n\n### Prompt Injection Exposure\n[Per component: injection surface score, current defenses, estimated bypass rate, recommended controls]\n\n### MCP Trust Assessment\n[Per installed MCP server: signed/unsigned, allowlist status, auth status, ...",
|
|
66
|
+
"key_xrefs": {
|
|
67
|
+
"cwe_refs": [
|
|
68
|
+
"CWE-1039",
|
|
69
|
+
"CWE-1426",
|
|
70
|
+
"CWE-94"
|
|
71
|
+
],
|
|
72
|
+
"d3fend_refs": [
|
|
73
|
+
"D3-IOPR",
|
|
74
|
+
"D3-NTA"
|
|
75
|
+
],
|
|
76
|
+
"framework_gaps": [
|
|
77
|
+
"ALL-AI-PIPELINE-INTEGRITY",
|
|
78
|
+
"ALL-PROMPT-INJECTION-ACCESS-CONTROL",
|
|
79
|
+
"ISO-27001-2022-A.8.28",
|
|
80
|
+
"ISO-IEC-23894-2023-clause-7",
|
|
81
|
+
"NIST-800-53-AC-2",
|
|
82
|
+
"NIST-800-53-SI-3",
|
|
83
|
+
"OWASP-LLM-Top-10-2025-LLM01",
|
|
84
|
+
"OWASP-LLM-Top-10-2025-LLM02",
|
|
85
|
+
"SOC2-CC6-logical-access"
|
|
86
|
+
],
|
|
87
|
+
"atlas_refs": [
|
|
88
|
+
"AML.T0043",
|
|
89
|
+
"AML.T0051",
|
|
90
|
+
"AML.T0054",
|
|
91
|
+
"AML.T0020",
|
|
92
|
+
"AML.T0096",
|
|
93
|
+
"AML.T0016",
|
|
94
|
+
"AML.T0017",
|
|
95
|
+
"AML.T0018"
|
|
96
|
+
],
|
|
97
|
+
"attack_refs": [
|
|
98
|
+
"T1566",
|
|
99
|
+
"T1059",
|
|
100
|
+
"T1190"
|
|
101
|
+
],
|
|
102
|
+
"rfc_refs": [],
|
|
103
|
+
"dlp_refs": []
|
|
104
|
+
},
|
|
105
|
+
"trigger_count": 9,
|
|
106
|
+
"atlas_count": 8,
|
|
107
|
+
"attack_count": 3,
|
|
108
|
+
"framework_gap_count": 9,
|
|
109
|
+
"cwe_count": 3,
|
|
110
|
+
"d3fend_count": 2,
|
|
111
|
+
"rfc_count": 0,
|
|
112
|
+
"last_threat_review": "2026-05-01",
|
|
113
|
+
"path": "skills/ai-attack-surface/skill.md",
|
|
114
|
+
"handoff_targets": []
|
|
115
|
+
},
|
|
116
|
+
"mcp-agent-trust": {
|
|
117
|
+
"description": "Enumerate MCP trust boundary failures — tool allowlisting, signed manifests, bearer auth, zero-interaction RCE",
|
|
118
|
+
"threat_context_excerpt": "The Model Context Protocol (MCP) is an open protocol for connecting AI assistants to external tools and data sources. It is now the standard integration layer for AI coding assistants: Cursor, VS Code + GitHub Copilot, Windsurf, Claude Code, and Gemini CLI all support MCP servers.",
|
|
119
|
+
"produces": "```\n## MCP Trust Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Scope:** [workstations / AI systems assessed]\n\n### Installed MCP Server Inventory\n| Server | Version | Source | Tools Exposed | Filesystem | Network | Shell | Auth Required | Allowlist |\n|--------|---------|--------|---------------|------------|---------|-------|---------------|-----------|\n\n### CVE-2026-30615 Exposure\n[Windsurf version check — patched/unpatched]\n\n### Trust Posture Score\n[Per server: Critical/High/Medium/Low with factor breakdown]\n\n### Immediate Actions Required\n[Servers to remove, versions to pin, configs to lock] ...",
|
|
120
|
+
"key_xrefs": {
|
|
121
|
+
"cwe_refs": [
|
|
122
|
+
"CWE-22",
|
|
123
|
+
"CWE-345",
|
|
124
|
+
"CWE-352",
|
|
125
|
+
"CWE-434",
|
|
126
|
+
"CWE-494",
|
|
127
|
+
"CWE-77",
|
|
128
|
+
"CWE-918",
|
|
129
|
+
"CWE-94"
|
|
130
|
+
],
|
|
131
|
+
"d3fend_refs": [
|
|
132
|
+
"D3-CBAN",
|
|
133
|
+
"D3-CSPP",
|
|
134
|
+
"D3-EAL",
|
|
135
|
+
"D3-EHB",
|
|
136
|
+
"D3-MFA"
|
|
137
|
+
],
|
|
138
|
+
"framework_gaps": [
|
|
139
|
+
"ALL-MCP-TOOL-TRUST",
|
|
140
|
+
"ISO-27001-2022-A.8.30",
|
|
141
|
+
"NIST-800-53-CM-7",
|
|
142
|
+
"NIST-800-53-SA-12",
|
|
143
|
+
"OWASP-LLM-Top-10-2025-LLM06",
|
|
144
|
+
"SOC2-CC9-vendor-management",
|
|
145
|
+
"SWIFT-CSCF-v2026-1.1"
|
|
146
|
+
],
|
|
147
|
+
"atlas_refs": [
|
|
148
|
+
"AML.T0010",
|
|
149
|
+
"AML.T0016",
|
|
150
|
+
"AML.T0096"
|
|
151
|
+
],
|
|
152
|
+
"attack_refs": [
|
|
153
|
+
"T1195.001",
|
|
154
|
+
"T1059",
|
|
155
|
+
"T1190"
|
|
156
|
+
],
|
|
157
|
+
"rfc_refs": [
|
|
158
|
+
"RFC-6749",
|
|
159
|
+
"RFC-7519",
|
|
160
|
+
"RFC-8446",
|
|
161
|
+
"RFC-8725",
|
|
162
|
+
"RFC-9114",
|
|
163
|
+
"RFC-9421",
|
|
164
|
+
"RFC-9700"
|
|
165
|
+
],
|
|
166
|
+
"dlp_refs": []
|
|
167
|
+
},
|
|
168
|
+
"trigger_count": 10,
|
|
169
|
+
"atlas_count": 3,
|
|
170
|
+
"attack_count": 3,
|
|
171
|
+
"framework_gap_count": 7,
|
|
172
|
+
"cwe_count": 8,
|
|
173
|
+
"d3fend_count": 5,
|
|
174
|
+
"rfc_count": 7,
|
|
175
|
+
"last_threat_review": "2026-05-01",
|
|
176
|
+
"path": "skills/mcp-agent-trust/skill.md",
|
|
177
|
+
"handoff_targets": [
|
|
178
|
+
"attack-surface-pentest",
|
|
179
|
+
"defensive-countermeasure-mapping",
|
|
180
|
+
"dlp-gap-analysis",
|
|
181
|
+
"framework-gap-analysis",
|
|
182
|
+
"supply-chain-integrity"
|
|
183
|
+
]
|
|
184
|
+
},
|
|
185
|
+
"framework-gap-analysis": {
|
|
186
|
+
"description": "Feed a framework control ID and threat scenario — receive the gap between what the control covers and what current TTPs require",
|
|
187
|
+
"threat_context_excerpt": "Compliance frameworks lag the threat environment by years. Most active controls in NIST 800-53, ISO 27001:2022, SOC 2, PCI DSS 4.0, NIS2, and DORA were drafted against assumptions (human-speed exploit development, persistent inventoriable assets, human-controlled accounts) that current attacker TTPs no longer respect. Three concrete mid-2026 instances anchor the lag:",
|
|
188
|
+
"produces": "Every framework gap analysis this skill produces uses the following literal template. Sections are mandatory; empty sections fail Hard Rule #11 (no-MVP ban).\n\n```\n## Framework Lag Declaration\n\n**Control:** [Control ID] — [Control name]\n**Framework:** [Framework name, version, and section reference]\n**Threat:** [CVE ID / ATLAS TTP ID / ATT&CK TTP ID / threat scenario description]\n\n### 1. What the control was designed for\n[Plain-language statement of the control's original intent and the era/threat model\nit was drafted against. Cite the control text verbatim where possible.]\n\n### 2. What current ...",
|
|
189
|
+
"key_xrefs": {
|
|
190
|
+
"cwe_refs": [],
|
|
191
|
+
"d3fend_refs": [],
|
|
192
|
+
"framework_gaps": [],
|
|
193
|
+
"atlas_refs": [],
|
|
194
|
+
"attack_refs": [],
|
|
195
|
+
"rfc_refs": [],
|
|
196
|
+
"dlp_refs": []
|
|
197
|
+
},
|
|
198
|
+
"trigger_count": 9,
|
|
199
|
+
"atlas_count": 0,
|
|
200
|
+
"attack_count": 0,
|
|
201
|
+
"framework_gap_count": 0,
|
|
202
|
+
"cwe_count": 0,
|
|
203
|
+
"d3fend_count": 0,
|
|
204
|
+
"rfc_count": 0,
|
|
205
|
+
"last_threat_review": "2026-05-01",
|
|
206
|
+
"path": "skills/framework-gap-analysis/skill.md",
|
|
207
|
+
"handoff_targets": []
|
|
208
|
+
},
|
|
209
|
+
"compliance-theater": {
|
|
210
|
+
"description": "Detect where an organization passes an audit but remains exposed — seven documented compliance theater patterns",
|
|
211
|
+
"threat_context_excerpt": "The defining mid-2026 reality is that an organization can pass a clean ISO 27001:2022, SOC 2 Type II, or PCI DSS 4.0 audit while remaining exposed to KEV-listed deterministic LPEs and zero-interaction RCEs. The contrast cases drive every theater pattern below:",
|
|
212
|
+
"produces": "```\n## Compliance Theater Assessment\n\n**Date:** YYYY-MM-DD\n**Framework(s):** [in scope]\n\n### Theater Detection Results\n\n| Pattern | Finding | Key Evidence |\n|---------|---------|--------------|\n| Patch Management | THEATER / CLEAR | [e.g., \"CISA KEV average remediation time: 18 days\"] |\n| Network Segmentation (IPsec) | THEATER / CLEAR | [e.g., \"CVE-2026-43284 unpatched on 12 of 40 hosts using IPsec\"] |\n| Access Control (AI Agents) | THEATER / CLEAR | [e.g., \"No prompt-level logging on Copilot deployments\"] |\n| Incident Response (AI) | THEATER / CLEAR | [e.g., \"Zero AI-specific playbooks in IR ...",
|
|
213
|
+
"key_xrefs": {
|
|
214
|
+
"cwe_refs": [],
|
|
215
|
+
"d3fend_refs": [],
|
|
216
|
+
"framework_gaps": [
|
|
217
|
+
"ALL-AI-PIPELINE-INTEGRITY",
|
|
218
|
+
"ALL-PROMPT-INJECTION-ACCESS-CONTROL",
|
|
219
|
+
"FedRAMP-Rev5-Moderate",
|
|
220
|
+
"CMMC-2.0-Level-2"
|
|
221
|
+
],
|
|
222
|
+
"atlas_refs": [],
|
|
223
|
+
"attack_refs": [],
|
|
224
|
+
"rfc_refs": [],
|
|
225
|
+
"dlp_refs": []
|
|
226
|
+
},
|
|
227
|
+
"trigger_count": 7,
|
|
228
|
+
"atlas_count": 0,
|
|
229
|
+
"attack_count": 0,
|
|
230
|
+
"framework_gap_count": 4,
|
|
231
|
+
"cwe_count": 0,
|
|
232
|
+
"d3fend_count": 0,
|
|
233
|
+
"rfc_count": 0,
|
|
234
|
+
"last_threat_review": "2026-05-01",
|
|
235
|
+
"path": "skills/compliance-theater/skill.md",
|
|
236
|
+
"handoff_targets": []
|
|
237
|
+
},
|
|
238
|
+
"exploit-scoring": {
|
|
239
|
+
"description": "Real-World Exploit Priority (RWEP) scoring — CVSS plus KEV, PoC, AI-acceleration, blast radius, live-patch factors",
|
|
240
|
+
"threat_context_excerpt": "RWEP exists because the exploit development cycle has compressed. The factors that CVSS does not model are now the dominant signal in real-world prioritization.",
|
|
241
|
+
"produces": "```\n## Exploit Priority Assessment\n\n**CVE:** [ID]\n**Assessment Date:** YYYY-MM-DD\n\n### CVSS vs. RWEP\n| Metric | Score | Priority Band |\n|--------|-------|---------------|\n| CVSS | [score] | [None/Low/Medium/High/Critical] |\n| RWEP | [score] | [see table above] |\n| Delta | [RWEP - CVSS×10] | [Explain if significant] |\n\n### RWEP Factor Breakdown\n| Factor | Value | Points |\n|--------|-------|--------|\n| CISA KEV | Yes/No | +25/0 |\n| PoC Public | Yes/No | +20/0 |\n| AI-Assisted | Yes/No | +15/0 |\n| Active Exploitation | Confirmed/Suspected/No | +20/+10/0 |\n| Blast Radius | [description] | [0-15] |\n ...",
|
|
242
|
+
"key_xrefs": {
|
|
243
|
+
"cwe_refs": [],
|
|
244
|
+
"d3fend_refs": [],
|
|
245
|
+
"framework_gaps": [
|
|
246
|
+
"CWE-Top-25-2024-meta",
|
|
247
|
+
"CIS-Controls-v8-Control7"
|
|
248
|
+
],
|
|
249
|
+
"atlas_refs": [],
|
|
250
|
+
"attack_refs": [],
|
|
251
|
+
"rfc_refs": [],
|
|
252
|
+
"dlp_refs": []
|
|
253
|
+
},
|
|
254
|
+
"trigger_count": 8,
|
|
255
|
+
"atlas_count": 0,
|
|
256
|
+
"attack_count": 0,
|
|
257
|
+
"framework_gap_count": 2,
|
|
258
|
+
"cwe_count": 0,
|
|
259
|
+
"d3fend_count": 0,
|
|
260
|
+
"rfc_count": 0,
|
|
261
|
+
"last_threat_review": "2026-05-01",
|
|
262
|
+
"path": "skills/exploit-scoring/skill.md",
|
|
263
|
+
"handoff_targets": []
|
|
264
|
+
},
|
|
265
|
+
"rag-pipeline-security": {
|
|
266
|
+
"description": "RAG-specific threat model — embedding manipulation, vector store poisoning, retrieval filter bypass, indirect prompt injection",
|
|
267
|
+
"threat_context_excerpt": "Retrieval-Augmented Generation (RAG) pipelines introduce a unique attack surface that exists at the intersection of traditional data security and AI-specific vulnerabilities. No current compliance framework has adequate controls for this attack surface. The threats in this skill are not theoretical — they have been demonstrated in research and observed in production incidents.",
|
|
268
|
+
"produces": "```\n## RAG Pipeline Security Assessment\n\n**Date:** YYYY-MM-DD\n**Knowledge Base:** [description]\n**Query Volume:** [requests/day estimate]\n\n### Pipeline Map\n[Ingestion → Chunking → Embedding → Store → Retrieval → Context → LLM → Output]\n\n### Attack Class Exposure\n| Attack Class | Possible | Attacker Access Required | Current Mitigations | Risk |\n|---|---|---|---|---|\n| Embedding manipulation (exfil) | | | | |\n| Vector store poisoning | | | | |\n| Chunking exploitation | | | | |\n| Retrieval filter bypass | | | | |\n| Indirect prompt injection | | | | |\n\n### RAG Security Score: [X/80]\n\n### Priority ...",
|
|
269
|
+
"key_xrefs": {
|
|
270
|
+
"cwe_refs": [
|
|
271
|
+
"CWE-1395",
|
|
272
|
+
"CWE-1426"
|
|
273
|
+
],
|
|
274
|
+
"d3fend_refs": [
|
|
275
|
+
"D3-CSPP",
|
|
276
|
+
"D3-IOPR",
|
|
277
|
+
"D3-NTA"
|
|
278
|
+
],
|
|
279
|
+
"framework_gaps": [
|
|
280
|
+
"ISO-27001-2022-A.8.28",
|
|
281
|
+
"NIST-800-53-SI-12",
|
|
282
|
+
"NIST-AI-RMF-MEASURE-2.5",
|
|
283
|
+
"OWASP-LLM-Top-10-2025-LLM08"
|
|
284
|
+
],
|
|
285
|
+
"atlas_refs": [
|
|
286
|
+
"AML.T0020",
|
|
287
|
+
"AML.T0043",
|
|
288
|
+
"AML.T0051",
|
|
289
|
+
"AML.T0054"
|
|
290
|
+
],
|
|
291
|
+
"attack_refs": [
|
|
292
|
+
"T1565"
|
|
293
|
+
],
|
|
294
|
+
"rfc_refs": [],
|
|
295
|
+
"dlp_refs": []
|
|
296
|
+
},
|
|
297
|
+
"trigger_count": 7,
|
|
298
|
+
"atlas_count": 4,
|
|
299
|
+
"attack_count": 1,
|
|
300
|
+
"framework_gap_count": 4,
|
|
301
|
+
"cwe_count": 2,
|
|
302
|
+
"d3fend_count": 3,
|
|
303
|
+
"rfc_count": 0,
|
|
304
|
+
"last_threat_review": "2026-05-01",
|
|
305
|
+
"path": "skills/rag-pipeline-security/skill.md",
|
|
306
|
+
"handoff_targets": [
|
|
307
|
+
"ai-attack-surface",
|
|
308
|
+
"attack-surface-pentest",
|
|
309
|
+
"defensive-countermeasure-mapping",
|
|
310
|
+
"dlp-gap-analysis",
|
|
311
|
+
"supply-chain-integrity"
|
|
312
|
+
]
|
|
313
|
+
},
|
|
314
|
+
"ai-c2-detection": {
|
|
315
|
+
"description": "Detect adversary use of AI APIs as covert C2 — SesameOp pattern, PROMPTFLUX/PROMPTSTEAL behavioral signatures",
|
|
316
|
+
"threat_context_excerpt": "The SesameOp campaign documented a technique that has since been replicated and expanded: adversaries repurposing legitimate AI agent APIs as covert command-and-control channels.",
|
|
317
|
+
"produces": "```\n## AI C2 Detection Assessment\n\n**Date:** YYYY-MM-DD\n**Scope:** [hosts / network segments assessed]\n\n### Current Detection Coverage\n| Detection Layer | Deployed | Coverage |\n|---|---|---|\n| Process-level AI API baseline | Yes/No | [% of host types covered] |\n| Behavioral correlation (AI + file/cred/scan) | Yes/No | [configured correlations] |\n| TLS inspection for AI traffic | Yes/No | [% of AI API traffic] |\n| Response monitoring | Yes/No | [coverage] |\n\n### Coverage Gaps\n[What's missing from the detection architecture]\n\n### Active Indicators\n[If this is a live investigation: current IOCs, ...",
|
|
318
|
+
"key_xrefs": {
|
|
319
|
+
"cwe_refs": [],
|
|
320
|
+
"d3fend_refs": [
|
|
321
|
+
"D3-CA",
|
|
322
|
+
"D3-CSPP",
|
|
323
|
+
"D3-DA",
|
|
324
|
+
"D3-IOPR",
|
|
325
|
+
"D3-NI",
|
|
326
|
+
"D3-NTA",
|
|
327
|
+
"D3-NTPM"
|
|
328
|
+
],
|
|
329
|
+
"framework_gaps": [
|
|
330
|
+
"NIST-800-53-SI-3",
|
|
331
|
+
"NIST-800-53-SC-7",
|
|
332
|
+
"ISO-27001-2022-A.8.16",
|
|
333
|
+
"SOC2-CC7-anomaly-detection"
|
|
334
|
+
],
|
|
335
|
+
"atlas_refs": [
|
|
336
|
+
"AML.T0096",
|
|
337
|
+
"AML.T0017"
|
|
338
|
+
],
|
|
339
|
+
"attack_refs": [
|
|
340
|
+
"T1071",
|
|
341
|
+
"T1102",
|
|
342
|
+
"T1568"
|
|
343
|
+
],
|
|
344
|
+
"rfc_refs": [
|
|
345
|
+
"RFC-8446",
|
|
346
|
+
"RFC-9180",
|
|
347
|
+
"RFC-9458",
|
|
348
|
+
"RFC-9421",
|
|
349
|
+
"RFC-9114",
|
|
350
|
+
"RFC-9000"
|
|
351
|
+
],
|
|
352
|
+
"dlp_refs": []
|
|
353
|
+
},
|
|
354
|
+
"trigger_count": 9,
|
|
355
|
+
"atlas_count": 2,
|
|
356
|
+
"attack_count": 3,
|
|
357
|
+
"framework_gap_count": 4,
|
|
358
|
+
"cwe_count": 0,
|
|
359
|
+
"d3fend_count": 7,
|
|
360
|
+
"rfc_count": 6,
|
|
361
|
+
"last_threat_review": "2026-05-01",
|
|
362
|
+
"path": "skills/ai-c2-detection/skill.md",
|
|
363
|
+
"handoff_targets": [
|
|
364
|
+
"attack-surface-pentest",
|
|
365
|
+
"compliance-theater",
|
|
366
|
+
"defensive-countermeasure-mapping",
|
|
367
|
+
"dlp-gap-analysis",
|
|
368
|
+
"mcp-agent-trust"
|
|
369
|
+
]
|
|
370
|
+
},
|
|
371
|
+
"policy-exception-gen": {
|
|
372
|
+
"description": "Generate defensible policy exceptions for architectural realities — ephemeral infra, AI pipelines, ZTA, no-reboot patching",
|
|
373
|
+
"threat_context_excerpt": "Most non-trivial mid-2026 production architectures break the literal reading of at least one major framework control. Serverless functions break asset-inventory language; immutable container images break in-place patch-window language; LLM API dependencies break change-management language; Zero Trust environments break network-segmentation language. Where the organization has no defensible exception process, only two outcomes remain: (1) the organization claims compliance falsely (theater) or (2) the audit blocks the architecture entirely.",
|
|
374
|
+
"produces": "Produce a complete, signed exception document using the applicable template above, populated with:\n- Specific control ID and text\n- Specific system or environment scope\n- Specific architectural constraint\n- Specific compensating controls with tool names and SLAs\n- Residual risk statement\n- Named risk owner\n- Expiration date or condition\n\n---",
|
|
375
|
+
"key_xrefs": {
|
|
376
|
+
"cwe_refs": [
|
|
377
|
+
"CWE-1188"
|
|
378
|
+
],
|
|
379
|
+
"d3fend_refs": [],
|
|
380
|
+
"framework_gaps": [],
|
|
381
|
+
"atlas_refs": [],
|
|
382
|
+
"attack_refs": [],
|
|
383
|
+
"rfc_refs": [],
|
|
384
|
+
"dlp_refs": []
|
|
385
|
+
},
|
|
386
|
+
"trigger_count": 8,
|
|
387
|
+
"atlas_count": 0,
|
|
388
|
+
"attack_count": 0,
|
|
389
|
+
"framework_gap_count": 0,
|
|
390
|
+
"cwe_count": 1,
|
|
391
|
+
"d3fend_count": 0,
|
|
392
|
+
"rfc_count": 0,
|
|
393
|
+
"last_threat_review": "2026-05-01",
|
|
394
|
+
"path": "skills/policy-exception-gen/skill.md",
|
|
395
|
+
"handoff_targets": []
|
|
396
|
+
},
|
|
397
|
+
"threat-model-currency": {
|
|
398
|
+
"description": "Score how current an org's threat model is against 2026 reality — 14-item checklist, currency percentage, prioritized update roadmap",
|
|
399
|
+
"threat_context_excerpt": "Most organizational threat models in circulation today are 2022–2024 vintage. They were written before the operational reality of mid-2026:",
|
|
400
|
+
"produces": "```\n## Threat Model Currency Assessment\n\n**Date:** YYYY-MM-DD\n**Threat Model Version:** [document version / last update date]\n\n### Currency Score: [X / 28] = [percentage]%\n**Rating:** [Current / Mostly current / Partially current / Significantly stale / Critically stale]\n\n### Class-by-Class Scoring\n| # | Threat Class | Score | Finding |\n|---|---|---|---|\n| 1 | AI-Discovered Kernel Vulnerabilities | 0/1/2 | [specific gap or confirmation] |\n| 2 | Deterministic Kernel LPE | 0/1/2 | |\n| 3 | IPsec Subsystem Exploitation | 0/1/2 | |\n| 4 | Prompt Injection as Enterprise RCE | 0/1/2 | |\n| 5 | MCP Supp ...",
|
|
401
|
+
"key_xrefs": {
|
|
402
|
+
"cwe_refs": [],
|
|
403
|
+
"d3fend_refs": [],
|
|
404
|
+
"framework_gaps": [],
|
|
405
|
+
"atlas_refs": [],
|
|
406
|
+
"attack_refs": [],
|
|
407
|
+
"rfc_refs": [],
|
|
408
|
+
"dlp_refs": []
|
|
409
|
+
},
|
|
410
|
+
"trigger_count": 6,
|
|
411
|
+
"atlas_count": 0,
|
|
412
|
+
"attack_count": 0,
|
|
413
|
+
"framework_gap_count": 0,
|
|
414
|
+
"cwe_count": 0,
|
|
415
|
+
"d3fend_count": 0,
|
|
416
|
+
"rfc_count": 0,
|
|
417
|
+
"last_threat_review": "2026-05-01",
|
|
418
|
+
"path": "skills/threat-model-currency/skill.md",
|
|
419
|
+
"handoff_targets": []
|
|
420
|
+
},
|
|
421
|
+
"global-grc": {
|
|
422
|
+
"description": "Multi-jurisdiction GRC mapping — EU (GDPR/NIS2/DORA/EU AI Act/CRA), UK, AU, SG, JP, IN, CA, ISO 27001:2022, CSA CCM v4",
|
|
423
|
+
"threat_context_excerpt": "US-only GRC posture is structurally incomplete for any organisation operating across EU, UK, AU, SG, IN, JP, or CA in mid-2026. The following regulatory instruments are in force or about to be, and have no direct US-framework equivalent:",
|
|
424
|
+
"produces": "```\n## Global GRC Assessment\n\n**Date:** YYYY-MM-DD\n**Jurisdictions in scope:** [list]\n**Sectors:** [list]\n\n### Applicable Framework Matrix\n| Framework | Jurisdiction | Trigger | Notification | Penalties | AI Coverage |\n|-----------|-------------|---------|--------------|-----------|-------------|\n\n### Fastest Notification Requirement\n[Which jurisdiction, which framework, what timeline]\n\n### Strictest AI/Security Requirements\n[For current threats: which framework is most demanding]\n\n### Universal Gaps\n[Threats that no applicable framework covers adequately]\n\n### Per-Threat Framework Mapping\n[Fo ...",
|
|
425
|
+
"key_xrefs": {
|
|
426
|
+
"cwe_refs": [],
|
|
427
|
+
"d3fend_refs": [],
|
|
428
|
+
"framework_gaps": [],
|
|
429
|
+
"atlas_refs": [],
|
|
430
|
+
"attack_refs": [],
|
|
431
|
+
"rfc_refs": [],
|
|
432
|
+
"dlp_refs": []
|
|
433
|
+
},
|
|
434
|
+
"trigger_count": 13,
|
|
435
|
+
"atlas_count": 0,
|
|
436
|
+
"attack_count": 0,
|
|
437
|
+
"framework_gap_count": 0,
|
|
438
|
+
"cwe_count": 0,
|
|
439
|
+
"d3fend_count": 0,
|
|
440
|
+
"rfc_count": 0,
|
|
441
|
+
"last_threat_review": "2026-05-01",
|
|
442
|
+
"path": "skills/global-grc/skill.md",
|
|
443
|
+
"handoff_targets": []
|
|
444
|
+
},
|
|
445
|
+
"zeroday-gap-learn": {
|
|
446
|
+
"description": "Run the zero-day learning loop — CVE to attack vector to control gap to framework gap to new control requirement",
|
|
447
|
+
"threat_context_excerpt": "The zero-day learning cycle has compressed. The frameworks have not.",
|
|
448
|
+
"produces": "```\n## Zero-Day Learning Loop: [CVE-ID / Vulnerability Name]\n\n**Date:** YYYY-MM-DD\n**RWEP:** [score]\n\n### Attack Vector\n[Extracted attack vector analysis]\n\n### Defense Chain Analysis\n| Layer | Required Control | Framework Coverage |\n|---|---|---|\n| Prevention | [control] | [Covered/Insufficient/Missing] |\n| Detection | [control] | [Covered/Insufficient/Missing] |\n| Response | [control] | [Covered/Insufficient/Missing] |\n\n### Framework Coverage Matrix\n[Per-framework table]\n\n### Gap Classification\n[Missing entirely / Insufficient / Compliant-but-exposed]\n\n### New Control Requirements\n[Generated ...",
|
|
449
|
+
"key_xrefs": {
|
|
450
|
+
"cwe_refs": [],
|
|
451
|
+
"d3fend_refs": [],
|
|
452
|
+
"framework_gaps": [],
|
|
453
|
+
"atlas_refs": [],
|
|
454
|
+
"attack_refs": [],
|
|
455
|
+
"rfc_refs": [],
|
|
456
|
+
"dlp_refs": []
|
|
457
|
+
},
|
|
458
|
+
"trigger_count": 7,
|
|
459
|
+
"atlas_count": 0,
|
|
460
|
+
"attack_count": 0,
|
|
461
|
+
"framework_gap_count": 0,
|
|
462
|
+
"cwe_count": 0,
|
|
463
|
+
"d3fend_count": 0,
|
|
464
|
+
"rfc_count": 0,
|
|
465
|
+
"last_threat_review": "2026-05-01",
|
|
466
|
+
"path": "skills/zeroday-gap-learn/skill.md",
|
|
467
|
+
"handoff_targets": []
|
|
468
|
+
},
|
|
469
|
+
"pqc-first": {
|
|
470
|
+
"description": "Post-quantum cryptography first mentality — hard version gates (OpenSSL 3.5+), algorithm sunset tracking, HNDL assessment, loopback learning for NIST/IETF evolution",
|
|
471
|
+
"threat_context_excerpt": "The post-quantum migration is not a planning exercise. It is an operational deadline against an adversary that is already collecting ciphertext.",
|
|
472
|
+
"produces": "```\n## PQC Readiness Assessment\n\n**Date:** YYYY-MM-DD\n**OpenSSL version:** [X.X.X] — [Pass ≥3.5.0 / FAIL]\n\n### Algorithm Inventory\n| Usage | Current Algorithm | PQC Status | Version Gate | Migration Required |\n|---|---|---|---|---|\n\n### HNDL Exposure\n| Data Type | Sensitivity Window | Key Exchange | HNDL Risk | Action |\n|---|---|---|---|---|\n\n### Version Gate Compliance\n[Per library: pass/fail with specific version found]\n\n### Migration Roadmap\n[Priority-ordered, specific to this system's algorithm inventory]\n\n### Forward Watch Status\n[Which tracked standards have updated since last review; wh ...",
|
|
473
|
+
"key_xrefs": {
|
|
474
|
+
"cwe_refs": [
|
|
475
|
+
"CWE-327"
|
|
476
|
+
],
|
|
477
|
+
"d3fend_refs": [
|
|
478
|
+
"D3-FE",
|
|
479
|
+
"D3-MENCR"
|
|
480
|
+
],
|
|
481
|
+
"framework_gaps": [
|
|
482
|
+
"NIST-800-53-SC-8",
|
|
483
|
+
"NIST-800-53-SC-28"
|
|
484
|
+
],
|
|
485
|
+
"atlas_refs": [],
|
|
486
|
+
"attack_refs": [],
|
|
487
|
+
"rfc_refs": [
|
|
488
|
+
"RFC-8446",
|
|
489
|
+
"DRAFT-IETF-TLS-ECDHE-MLKEM",
|
|
490
|
+
"DRAFT-IETF-TLS-HYBRID-DESIGN",
|
|
491
|
+
"RFC-9180",
|
|
492
|
+
"RFC-9420",
|
|
493
|
+
"RFC-9794",
|
|
494
|
+
"RFC-8032",
|
|
495
|
+
"RFC-9106"
|
|
496
|
+
],
|
|
497
|
+
"dlp_refs": []
|
|
498
|
+
},
|
|
499
|
+
"trigger_count": 14,
|
|
500
|
+
"atlas_count": 0,
|
|
501
|
+
"attack_count": 0,
|
|
502
|
+
"framework_gap_count": 2,
|
|
503
|
+
"cwe_count": 1,
|
|
504
|
+
"d3fend_count": 2,
|
|
505
|
+
"rfc_count": 8,
|
|
506
|
+
"last_threat_review": "2026-05-01",
|
|
507
|
+
"path": "skills/pqc-first/skill.md",
|
|
508
|
+
"handoff_targets": []
|
|
509
|
+
},
|
|
510
|
+
"skill-update-loop": {
|
|
511
|
+
"description": "Meta-skill for keeping all exceptd skills current — CISA KEV triggers, ATLAS version updates, framework amendments, forward_watch resolution, currency scoring",
|
|
512
|
+
"threat_context_excerpt": null,
|
|
513
|
+
"produces": "```\n## Skill Update Loop Report\n\n**Date:** YYYY-MM-DD\n**Last Full Review:** [date from manifest.json]\n\n### Unprocessed Triggers\n| Trigger Type | Item | Affected Skills | Urgency |\n|---|---|---|---|\n\n### Skill Currency Scores\n| Skill | Last Review | Currency Score | Status |\n|---|---|---|---|\n\n### Prioritized Update Tasks\n[Ordered by urgency: specific skill, specific section, specific required change]\n\n### Forward Watch Status\n[Per skill's forward_watch items: resolved/pending/newly added]\n```\n\n---",
|
|
514
|
+
"key_xrefs": {
|
|
515
|
+
"cwe_refs": [],
|
|
516
|
+
"d3fend_refs": [],
|
|
517
|
+
"framework_gaps": [],
|
|
518
|
+
"atlas_refs": [],
|
|
519
|
+
"attack_refs": [],
|
|
520
|
+
"rfc_refs": [],
|
|
521
|
+
"dlp_refs": []
|
|
522
|
+
},
|
|
523
|
+
"trigger_count": 10,
|
|
524
|
+
"atlas_count": 0,
|
|
525
|
+
"attack_count": 0,
|
|
526
|
+
"framework_gap_count": 0,
|
|
527
|
+
"cwe_count": 0,
|
|
528
|
+
"d3fend_count": 0,
|
|
529
|
+
"rfc_count": 0,
|
|
530
|
+
"last_threat_review": "2026-05-01",
|
|
531
|
+
"path": "skills/skill-update-loop/skill.md",
|
|
532
|
+
"handoff_targets": []
|
|
533
|
+
},
|
|
534
|
+
"security-maturity-tiers": {
|
|
535
|
+
"description": "Three-tier implementation roadmap — MVP (ship this week), Practical (scalable today), Overkill (defense-in-depth)",
|
|
536
|
+
"threat_context_excerpt": "The 2026 threat baseline forces an MVP that would have looked like a Practical tier in 2022. The cardinal observed change: attacker capability now compresses the time from disclosure to reliable exploitation to hours for an entire class of vulnerabilities, and AI-mediated attack surfaces (prompt injection, MCP supply chain, AI-API C2) sit outside the perimeter and identity controls every framework relies on. The implications by tier:",
|
|
537
|
+
"produces": "```\n## Security Maturity Roadmap\n\n**Date:** YYYY-MM-DD\n**Domains in scope:** [list]\n**Current state:** [assessment]\n**Constraint:** [time / team / compliance / budget]\n\n### Priority Sequence\n[Week 1 / Month 1 / Quarter 1 / Year 1 items]\n\n### Domain: [name]\n\n#### Tier 1 — MVP (Ship this week)\n[Specific commands, configurations, verification steps]\n**Done when:** [concrete completion criteria]\n**Cost:** [hours, no new tools needed / minimal tooling]\n\n#### Tier 2 — Practical (Quarter 1)\n[Scalable, monitored, sustainable]\n**Adds:** [what Tier 1 misses that Tier 2 provides]\n**Cost:** [operational o ...",
|
|
538
|
+
"key_xrefs": {
|
|
539
|
+
"cwe_refs": [
|
|
540
|
+
"CWE-1188"
|
|
541
|
+
],
|
|
542
|
+
"d3fend_refs": [],
|
|
543
|
+
"framework_gaps": [],
|
|
544
|
+
"atlas_refs": [],
|
|
545
|
+
"attack_refs": [],
|
|
546
|
+
"rfc_refs": [],
|
|
547
|
+
"dlp_refs": []
|
|
548
|
+
},
|
|
549
|
+
"trigger_count": 12,
|
|
550
|
+
"atlas_count": 0,
|
|
551
|
+
"attack_count": 0,
|
|
552
|
+
"framework_gap_count": 0,
|
|
553
|
+
"cwe_count": 1,
|
|
554
|
+
"d3fend_count": 0,
|
|
555
|
+
"rfc_count": 0,
|
|
556
|
+
"last_threat_review": "2026-05-01",
|
|
557
|
+
"path": "skills/security-maturity-tiers/skill.md",
|
|
558
|
+
"handoff_targets": []
|
|
559
|
+
},
|
|
560
|
+
"researcher": {
|
|
561
|
+
"description": "Triage entry-point for raw threat intel — researches an input across all exceptd data catalogs, RWEP-scores it, and routes the operator to the right specialized skill(s)",
|
|
562
|
+
"threat_context_excerpt": "Most security teams in mid-2026 sit on a torrent of raw threat input: CISA KEV additions, vendor advisories, ATLAS updates, red-team reports, internal SIEM alerts, framework amendment bulletins, supply-chain notices. The two failure modes are symmetric and equally damaging.",
|
|
563
|
+
"produces": "```\n# Researcher Triage Report — <input>\n\n## What this is\n<one-line classification + canonical reference>\nExample: \"CVE — Linux kernel LPE. Canonical: CVE-2026-31431 (Copy Fail).\"\n\n## RWEP-anchored priority\nRWEP: <score> / 100 CVSS: <score> (for compatibility, not primary)\nDrivers: <CISA KEV: yes/no> | <Public PoC: yes/no> | <AI-discovered/AI-accelerated: yes/no> | <Blast radius: scope> | <Live-patch: available/unavailable> | <Reboot required: yes/no>\nDeterminism: <deterministic / probabilistic with race> | Exploit size: <bytes or LOC if known>\nCatalog status: <full entry present | partial | ...",
|
|
564
|
+
"key_xrefs": {
|
|
565
|
+
"cwe_refs": [],
|
|
566
|
+
"d3fend_refs": [],
|
|
567
|
+
"framework_gaps": [],
|
|
568
|
+
"atlas_refs": [],
|
|
569
|
+
"attack_refs": [],
|
|
570
|
+
"rfc_refs": [],
|
|
571
|
+
"dlp_refs": []
|
|
572
|
+
},
|
|
573
|
+
"trigger_count": 10,
|
|
574
|
+
"atlas_count": 0,
|
|
575
|
+
"attack_count": 0,
|
|
576
|
+
"framework_gap_count": 0,
|
|
577
|
+
"cwe_count": 0,
|
|
578
|
+
"d3fend_count": 0,
|
|
579
|
+
"rfc_count": 0,
|
|
580
|
+
"last_threat_review": "2026-05-11",
|
|
581
|
+
"path": "skills/researcher/skill.md",
|
|
582
|
+
"handoff_targets": []
|
|
583
|
+
},
|
|
584
|
+
"attack-surface-pentest": {
|
|
585
|
+
"description": "Modern attack surface management + pen testing methodology for AI-era environments — NIST 800-115, OWASP WSTG, PTES, ATT&CK-driven adversary emulation, TIBER-EU",
|
|
586
|
+
"threat_context_excerpt": "The attack surface is no longer a list of internet-facing IPs and web apps. By mid-2026 the surface a competent adversary maps for a target enterprise includes seven distinct, simultaneously exploitable layers — and the typical pen test scope covers two of them.",
|
|
587
|
+
"produces": "```\n## Penetration Test Report — [Engagement Name]\n\n**Engagement window:** [start] – [end]\n**Tester(s) / firm:** [names + certifications]\n**Authorising party:** [client representative]\n**Scope reference:** [PTES Pre-engagement document / TIBER-EU TI-Provider report / equivalent]\n\n### 1. Executive summary\n- Top 5 findings by RWEP, one sentence each.\n- Defense-in-depth verdict: which layers held, which failed.\n- Zero-trust verdict: were implicit-trust crossings reachable?\n- Overall posture characterisation against the mid-2026 attack surface.\n\n### 2. Scope and rules of engagement\n[Verbatim or re ...",
|
|
588
|
+
"key_xrefs": {
|
|
589
|
+
"cwe_refs": [
|
|
590
|
+
"CWE-1395",
|
|
591
|
+
"CWE-22",
|
|
592
|
+
"CWE-269",
|
|
593
|
+
"CWE-352",
|
|
594
|
+
"CWE-434",
|
|
595
|
+
"CWE-732",
|
|
596
|
+
"CWE-78",
|
|
597
|
+
"CWE-787",
|
|
598
|
+
"CWE-79",
|
|
599
|
+
"CWE-89",
|
|
600
|
+
"CWE-918"
|
|
601
|
+
],
|
|
602
|
+
"d3fend_refs": [
|
|
603
|
+
"D3-CSPP",
|
|
604
|
+
"D3-EAL",
|
|
605
|
+
"D3-NTA"
|
|
606
|
+
],
|
|
607
|
+
"framework_gaps": [
|
|
608
|
+
"NIST-800-115",
|
|
609
|
+
"OWASP-Pen-Testing-Guide-v5",
|
|
610
|
+
"PTES-Pre-engagement",
|
|
611
|
+
"NIS2-Art21-patch-management"
|
|
612
|
+
],
|
|
613
|
+
"atlas_refs": [
|
|
614
|
+
"AML.T0043",
|
|
615
|
+
"AML.T0051",
|
|
616
|
+
"AML.T0010"
|
|
617
|
+
],
|
|
618
|
+
"attack_refs": [
|
|
619
|
+
"T1190",
|
|
620
|
+
"T1133",
|
|
621
|
+
"T1059",
|
|
622
|
+
"T1078"
|
|
623
|
+
],
|
|
624
|
+
"rfc_refs": [],
|
|
625
|
+
"dlp_refs": []
|
|
626
|
+
},
|
|
627
|
+
"trigger_count": 11,
|
|
628
|
+
"atlas_count": 3,
|
|
629
|
+
"attack_count": 4,
|
|
630
|
+
"framework_gap_count": 4,
|
|
631
|
+
"cwe_count": 11,
|
|
632
|
+
"d3fend_count": 3,
|
|
633
|
+
"rfc_count": 0,
|
|
634
|
+
"last_threat_review": "2026-05-11",
|
|
635
|
+
"path": "skills/attack-surface-pentest/skill.md",
|
|
636
|
+
"handoff_targets": []
|
|
637
|
+
},
|
|
638
|
+
"fuzz-testing-strategy": {
|
|
639
|
+
"description": "Continuous fuzzing as a security control — coverage-guided fuzz (AFL++/libFuzzer), AI-assisted fuzz, OSS-Fuzz integration, kernel fuzz (syzkaller), AI-API fuzz, integration into CI/CD as compliance evidence",
|
|
640
|
+
"threat_context_excerpt": "By mid-2026 the asymmetry between offensive and defensive fuzzing has flipped. The defender's question is no longer \"should we fuzz?\" — it is \"are we fuzzing as fast as attackers are fuzzing us?\"",
|
|
641
|
+
"produces": "```\n## Fuzz Posture Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Component / Estate:** [scope]\n**Assessor:** [role]\n\n### Fuzz-Eligible Interface Inventory\n| Interface | Class | Harness Present | Tool | CI-Gated | Last Run |\n|---|---|---|---|---|---|\n| [name] | parser/IPC/API/kernel/LLM | Yes/No | [AFL++/libFuzzer/syzkaller/RESTler/garak/...] | Yes/No | YYYY-MM-DD |\n\n### Coverage Report\n| Harness | Line Coverage | Branch Coverage | CPU-Hours / Release | Uncovered Reachable Code |\n|---|---|---|---|---|\n| [name] | [N]% | [N]% | [N] | [list of un-fuzzed reachable functions] |\n\n### Crash Inventory ...",
|
|
642
|
+
"key_xrefs": {
|
|
643
|
+
"cwe_refs": [
|
|
644
|
+
"CWE-125",
|
|
645
|
+
"CWE-20",
|
|
646
|
+
"CWE-362",
|
|
647
|
+
"CWE-416",
|
|
648
|
+
"CWE-78",
|
|
649
|
+
"CWE-787"
|
|
650
|
+
],
|
|
651
|
+
"d3fend_refs": [
|
|
652
|
+
"D3-EAL",
|
|
653
|
+
"D3-IOPR",
|
|
654
|
+
"D3-PSEP"
|
|
655
|
+
],
|
|
656
|
+
"framework_gaps": [
|
|
657
|
+
"NIST-800-218-SSDF",
|
|
658
|
+
"NIST-800-115",
|
|
659
|
+
"OWASP-ASVS-v5.0-V14"
|
|
660
|
+
],
|
|
661
|
+
"atlas_refs": [
|
|
662
|
+
"AML.T0043"
|
|
663
|
+
],
|
|
664
|
+
"attack_refs": [
|
|
665
|
+
"T1190"
|
|
666
|
+
],
|
|
667
|
+
"rfc_refs": [],
|
|
668
|
+
"dlp_refs": []
|
|
669
|
+
},
|
|
670
|
+
"trigger_count": 11,
|
|
671
|
+
"atlas_count": 1,
|
|
672
|
+
"attack_count": 1,
|
|
673
|
+
"framework_gap_count": 3,
|
|
674
|
+
"cwe_count": 6,
|
|
675
|
+
"d3fend_count": 3,
|
|
676
|
+
"rfc_count": 0,
|
|
677
|
+
"last_threat_review": "2026-05-11",
|
|
678
|
+
"path": "skills/fuzz-testing-strategy/skill.md",
|
|
679
|
+
"handoff_targets": []
|
|
680
|
+
},
|
|
681
|
+
"dlp-gap-analysis": {
|
|
682
|
+
"description": "DLP gap analysis for mid-2026 — legacy DLP misses LLM prompts, MCP tool args, RAG retrievals, embedding-store exfil, and code-completion telemetry. Audit channels, classifiers, protected surfaces, enforcement actions, and evidence trails against modern threat reality and cross-jurisdictional privacy regimes",
|
|
683
|
+
"threat_context_excerpt": "DLP's protected surface inverted between 2024 and 2026. Crown-jewel data is no longer \"rows in this database\" — it is \"anything that crosses an LLM context window.\" Legacy DLP (outbound email, web upload, USB removable media) is solved in the sense that every commercial DLP suite covers those channels and every prescriptive framework cites them. The compliance-relevant exfiltration channels of 2026 are different: free-form LLM prompts, file attachments and RAG retrievals placed into model context, MCP tool-call arguments, code-completion context windows, IDE and dev-tool telemetry, and ...",
|
|
684
|
+
"produces": "```\n## DLP Gap Analysis\n\n**Date:** YYYY-MM-DD\n**Scope:** [org units, tenants, network segments assessed]\n**Frameworks in scope:** [list, including jurisdictions]\n\n### AI Tool Inventory (Step 1)\n| Tool | Sanctioned? | Identities Using | First Seen | Channel(s) |\n|---|---|---|---|---|\n\n### Channel × Surface × Control Matrix (Steps 2–4)\nFor each tool × channel × protected surface intersection: which DLP control applies (ID from `data/dlp-controls.json`), deployment state (Deployed / Deployed-untuned-for-AI / Absent), residual risk note.\n\n### Gap Register (Step 5)\n| Gap ID | Channel × Surface | Mi ...",
|
|
685
|
+
"key_xrefs": {
|
|
686
|
+
"cwe_refs": [
|
|
687
|
+
"CWE-1426",
|
|
688
|
+
"CWE-200"
|
|
689
|
+
],
|
|
690
|
+
"d3fend_refs": [
|
|
691
|
+
"D3-CSPP",
|
|
692
|
+
"D3-EAL",
|
|
693
|
+
"D3-IOPR",
|
|
694
|
+
"D3-NTA",
|
|
695
|
+
"D3-NTPM"
|
|
696
|
+
],
|
|
697
|
+
"framework_gaps": [
|
|
698
|
+
"NIST-800-53-SC-7",
|
|
699
|
+
"ISO-27001-2022-A.8.16",
|
|
700
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
701
|
+
"HIPAA-Security-Rule-164.312(a)(1)",
|
|
702
|
+
"SOC2-CC7-anomaly-detection",
|
|
703
|
+
"NIST-800-53-SC-28"
|
|
704
|
+
],
|
|
705
|
+
"atlas_refs": [
|
|
706
|
+
"AML.T0096",
|
|
707
|
+
"AML.T0017",
|
|
708
|
+
"AML.T0051"
|
|
709
|
+
],
|
|
710
|
+
"attack_refs": [
|
|
711
|
+
"T1567",
|
|
712
|
+
"T1530",
|
|
713
|
+
"T1213",
|
|
714
|
+
"T1041"
|
|
715
|
+
],
|
|
716
|
+
"rfc_refs": [
|
|
717
|
+
"RFC-8446",
|
|
718
|
+
"RFC-9458"
|
|
719
|
+
],
|
|
720
|
+
"dlp_refs": []
|
|
721
|
+
},
|
|
722
|
+
"trigger_count": 14,
|
|
723
|
+
"atlas_count": 3,
|
|
724
|
+
"attack_count": 4,
|
|
725
|
+
"framework_gap_count": 6,
|
|
726
|
+
"cwe_count": 2,
|
|
727
|
+
"d3fend_count": 5,
|
|
728
|
+
"rfc_count": 2,
|
|
729
|
+
"last_threat_review": "2026-05-11",
|
|
730
|
+
"path": "skills/dlp-gap-analysis/skill.md",
|
|
731
|
+
"handoff_targets": []
|
|
732
|
+
},
|
|
733
|
+
"supply-chain-integrity": {
|
|
734
|
+
"description": "Supply-chain integrity for mid-2026 — SLSA L3+, in-toto attestations, Sigstore signing, SBOM (CycloneDX/SPDX), VEX via CSAF 2.0, AI-generated code provenance, model weights as supply-chain artifacts",
|
|
735
|
+
"threat_context_excerpt": "The supply chain has expanded far beyond \"a vulnerable dependency in npm or PyPI.\" In mid-2026 the in-scope artifacts are every build-pipeline input, every CI runner image, every container base, every transitive package, every model weight loaded at inference time, and every snippet of code generated by an AI coding assistant and committed to the repository.",
|
|
736
|
+
"produces": "```\n## Supply-Chain Integrity Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Scope:** [pipelines / repositories / model registries / runtime environments assessed]\n**Frameworks in scope:** [NIST 800-218 SSDF | NIST 800-161 | ISO 27001:2022 A.5.21 | EU CRA | EU AI Act | UK NCSC | AU ISM / IRAP | PCI 4.0]\n\n### Pipeline SLSA Scorecard\n| Pipeline | Type (CI / model-train / AI-codegen) | Runner | Current SLSA Level | Provenance Signed? | Attestation Chain? | Gap |\n\n### SBOM Coverage\n| Artifact Class | Format (CycloneDX 1.6 / SPDX 3.0) | Build-Time SBOM | Deploy-Time SBOM | ML-BOM Where Applicable | ...",
|
|
737
|
+
"key_xrefs": {
|
|
738
|
+
"cwe_refs": [
|
|
739
|
+
"CWE-1357",
|
|
740
|
+
"CWE-1395",
|
|
741
|
+
"CWE-494",
|
|
742
|
+
"CWE-502",
|
|
743
|
+
"CWE-829"
|
|
744
|
+
],
|
|
745
|
+
"d3fend_refs": [
|
|
746
|
+
"D3-CBAN",
|
|
747
|
+
"D3-EAL",
|
|
748
|
+
"D3-EHB"
|
|
749
|
+
],
|
|
750
|
+
"framework_gaps": [
|
|
751
|
+
"NIST-800-218-SSDF",
|
|
752
|
+
"SLSA-v1.0-Build-L3",
|
|
753
|
+
"VEX-CSAF-v2.1",
|
|
754
|
+
"CycloneDX-v1.6-SBOM",
|
|
755
|
+
"SPDX-v3.0-SBOM",
|
|
756
|
+
"NIST-800-53-SA-12",
|
|
757
|
+
"HITRUST-CSF-v11.4-09.l",
|
|
758
|
+
"SWIFT-CSCF-v2026-1.1",
|
|
759
|
+
"FedRAMP-Rev5-Moderate",
|
|
760
|
+
"CMMC-2.0-Level-2"
|
|
761
|
+
],
|
|
762
|
+
"atlas_refs": [
|
|
763
|
+
"AML.T0010",
|
|
764
|
+
"AML.T0018"
|
|
765
|
+
],
|
|
766
|
+
"attack_refs": [
|
|
767
|
+
"T1195.001",
|
|
768
|
+
"T1195.002",
|
|
769
|
+
"T1554"
|
|
770
|
+
],
|
|
771
|
+
"rfc_refs": [
|
|
772
|
+
"RFC-8032"
|
|
773
|
+
],
|
|
774
|
+
"dlp_refs": []
|
|
775
|
+
},
|
|
776
|
+
"trigger_count": 14,
|
|
777
|
+
"atlas_count": 2,
|
|
778
|
+
"attack_count": 3,
|
|
779
|
+
"framework_gap_count": 10,
|
|
780
|
+
"cwe_count": 5,
|
|
781
|
+
"d3fend_count": 3,
|
|
782
|
+
"rfc_count": 1,
|
|
783
|
+
"last_threat_review": "2026-05-11",
|
|
784
|
+
"path": "skills/supply-chain-integrity/skill.md",
|
|
785
|
+
"handoff_targets": []
|
|
786
|
+
},
|
|
787
|
+
"defensive-countermeasure-mapping": {
|
|
788
|
+
"description": "Map offensive findings (CVE / TTP / framework gap) to MITRE D3FEND defensive countermeasures with explicit defense-in-depth, least-privilege, and zero-trust layering",
|
|
789
|
+
"threat_context_excerpt": "ATT&CK and ATLAS are now load-bearing in SOC detection engineering. Detection content is written against technique IDs; red-team reports are mapped to technique IDs; threat intel feeds emit technique IDs. The result: the offensive side of every blue-team discussion is technique-grained and crisp.",
|
|
790
|
+
"produces": "```\n# Defensive Countermeasure Map — <input>\n\n## What this is\n<one-line classification + canonical reference>\nExample: \"CVE — Linux kernel LPE. Canonical: CVE-2026-31431 (Copy Fail).\"\n\n## Offensive technique set (input to D3FEND query)\n- <AML.Txxxx / Txxxx / CWE-xxx list, with one-line descriptions>\n\n## Defensive-coverage map\n| D3FEND ID | Name | Tactic (DiD layer) | Privilege scope | ZT posture | Deployed? | AI-pipeline applicable? | Framework controls partially mapped | Live-tunable? |\n|-----------|------|--------------------|-----------------|------------|-----------|----------------------- ...",
|
|
791
|
+
"key_xrefs": {
|
|
792
|
+
"cwe_refs": [],
|
|
793
|
+
"d3fend_refs": [
|
|
794
|
+
"D3-ASLR",
|
|
795
|
+
"D3-CA",
|
|
796
|
+
"D3-CBAN",
|
|
797
|
+
"D3-CSPP",
|
|
798
|
+
"D3-DA",
|
|
799
|
+
"D3-EAL",
|
|
800
|
+
"D3-EHB",
|
|
801
|
+
"D3-FAPA",
|
|
802
|
+
"D3-FE",
|
|
803
|
+
"D3-IOPR",
|
|
804
|
+
"D3-MENCR",
|
|
805
|
+
"D3-MFA",
|
|
806
|
+
"D3-NI",
|
|
807
|
+
"D3-NTA",
|
|
808
|
+
"D3-NTPM",
|
|
809
|
+
"D3-PA",
|
|
810
|
+
"D3-PHRA",
|
|
811
|
+
"D3-PSEP",
|
|
812
|
+
"D3-RPA",
|
|
813
|
+
"D3-SCP"
|
|
814
|
+
],
|
|
815
|
+
"framework_gaps": [],
|
|
816
|
+
"atlas_refs": [],
|
|
817
|
+
"attack_refs": [],
|
|
818
|
+
"rfc_refs": [],
|
|
819
|
+
"dlp_refs": []
|
|
820
|
+
},
|
|
821
|
+
"trigger_count": 11,
|
|
822
|
+
"atlas_count": 0,
|
|
823
|
+
"attack_count": 0,
|
|
824
|
+
"framework_gap_count": 0,
|
|
825
|
+
"cwe_count": 0,
|
|
826
|
+
"d3fend_count": 20,
|
|
827
|
+
"rfc_count": 0,
|
|
828
|
+
"last_threat_review": "2026-05-11",
|
|
829
|
+
"path": "skills/defensive-countermeasure-mapping/skill.md",
|
|
830
|
+
"handoff_targets": []
|
|
831
|
+
},
|
|
832
|
+
"identity-assurance": {
|
|
833
|
+
"description": "Identity assurance for mid-2026 — NIST 800-63 AAL/IAL/FAL, FIDO2/WebAuthn passkeys, OIDC/SAML/SCIM, agent-as-principal identity, short-lived workload tokens, OAuth 2.0 + RFC 9700 BCP",
|
|
834
|
+
"threat_context_excerpt": "Identity is the new perimeter, and the perimeter expanded. The 2026 principal population is no longer \"humans + service accounts\" — it now includes AI agents acting on behalf of users, MCP servers exchanging short-lived tokens, and ephemeral workload identities minted per function invocation. Each of these is a principal that authenticates, holds scopes, and shows up in audit logs — and each was outside the design envelope of every identity standard in production use before NIST 800-63 rev 4 (Q4 2025).",
|
|
835
|
+
"produces": "```\n## Identity Assurance Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Scope:** [org units / IdPs / SaaS apps / workload clusters / AI-agent fleets in scope]\n**Jurisdictions:** [EU NIS2 / DORA, UK CAF, AU ISM, ISO 27001, plus IL INCD / CH FINMA / JP FISC / SG MAS / IN CERT-In / NY DFS where applicable]\n\n### Per-Principal Assurance Scorecard\n| Principal | Class (Human/Service/Agent) | Current AAL | Target AAL | Current IAL | Target IAL | Current FAL | Target FAL | Gap |\n|-----------|----------------------------|-------------|------------|-------------|------------|-------------|------------|-- ...",
|
|
836
|
+
"key_xrefs": {
|
|
837
|
+
"cwe_refs": [
|
|
838
|
+
"CWE-269",
|
|
839
|
+
"CWE-287",
|
|
840
|
+
"CWE-306",
|
|
841
|
+
"CWE-732",
|
|
842
|
+
"CWE-798",
|
|
843
|
+
"CWE-862",
|
|
844
|
+
"CWE-863"
|
|
845
|
+
],
|
|
846
|
+
"d3fend_refs": [],
|
|
847
|
+
"framework_gaps": [
|
|
848
|
+
"NIST-800-63B-rev4",
|
|
849
|
+
"NIST-800-53-AC-2",
|
|
850
|
+
"ISO-27001-2022-A.8.30",
|
|
851
|
+
"SOC2-CC6-logical-access",
|
|
852
|
+
"PSD2-RTS-SCA"
|
|
853
|
+
],
|
|
854
|
+
"atlas_refs": [
|
|
855
|
+
"AML.T0051"
|
|
856
|
+
],
|
|
857
|
+
"attack_refs": [
|
|
858
|
+
"T1078",
|
|
859
|
+
"T1556",
|
|
860
|
+
"T1110"
|
|
861
|
+
],
|
|
862
|
+
"rfc_refs": [
|
|
863
|
+
"RFC-7519",
|
|
864
|
+
"RFC-8725",
|
|
865
|
+
"RFC-6749",
|
|
866
|
+
"RFC-9700",
|
|
867
|
+
"RFC-8032"
|
|
868
|
+
],
|
|
869
|
+
"dlp_refs": []
|
|
870
|
+
},
|
|
871
|
+
"trigger_count": 16,
|
|
872
|
+
"atlas_count": 1,
|
|
873
|
+
"attack_count": 3,
|
|
874
|
+
"framework_gap_count": 5,
|
|
875
|
+
"cwe_count": 7,
|
|
876
|
+
"d3fend_count": 0,
|
|
877
|
+
"rfc_count": 5,
|
|
878
|
+
"last_threat_review": "2026-05-11",
|
|
879
|
+
"path": "skills/identity-assurance/skill.md",
|
|
880
|
+
"handoff_targets": [
|
|
881
|
+
"compliance-theater",
|
|
882
|
+
"defensive-countermeasure-mapping",
|
|
883
|
+
"dlp-gap-analysis",
|
|
884
|
+
"mcp-agent-trust",
|
|
885
|
+
"supply-chain-integrity"
|
|
886
|
+
]
|
|
887
|
+
},
|
|
888
|
+
"ot-ics-security": {
|
|
889
|
+
"description": "OT / ICS security for mid-2026 — NIST 800-82r3, IEC 62443-3-3, NERC CIP, IT/OT convergence risks, AI-augmented HMI threats, ICS-specific TTPs (ATT&CK for ICS)",
|
|
890
|
+
"threat_context_excerpt": "OT is no longer air-gapped. The \"air gap\" is a label on a Visio file, not a property of the production network. IT/OT convergence is a fait decompli at every Tier-1 operator and most Tier-2/3 manufacturers, utilities, and water authorities:",
|
|
891
|
+
"produces": "Produce this structure verbatim:\n\n```\n## OT / ICS Security Posture Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Site / Operator:** [name]\n**Process(es) in scope:** [e.g., crude distillation unit; 500kV substation; water treatment Train A]\n**Regulatory jurisdictions:** [US/NERC, EU/NIS2, UK/CAF, AU/SOCI+AESCSF, ...]\n\n### Purdue-Level Asset Inventory\n| Level | Assets (count + class) | OS / Firmware Range | Avg Age (years) | Patch Posture |\n|-------|------------------------|---------------------|-----------------|----------------|\n| L0 | ... | ... | ... ...",
|
|
892
|
+
"key_xrefs": {
|
|
893
|
+
"cwe_refs": [
|
|
894
|
+
"CWE-287",
|
|
895
|
+
"CWE-798",
|
|
896
|
+
"CWE-306",
|
|
897
|
+
"CWE-1037"
|
|
898
|
+
],
|
|
899
|
+
"d3fend_refs": [],
|
|
900
|
+
"framework_gaps": [
|
|
901
|
+
"NIST-800-82r3",
|
|
902
|
+
"IEC-62443-3-3",
|
|
903
|
+
"NERC-CIP-007-6-R4",
|
|
904
|
+
"NIS2-Art21-patch-management"
|
|
905
|
+
],
|
|
906
|
+
"atlas_refs": [
|
|
907
|
+
"AML.T0010"
|
|
908
|
+
],
|
|
909
|
+
"attack_refs": [
|
|
910
|
+
"T0855",
|
|
911
|
+
"T0883",
|
|
912
|
+
"T1190",
|
|
913
|
+
"T1068"
|
|
914
|
+
],
|
|
915
|
+
"rfc_refs": [],
|
|
916
|
+
"dlp_refs": []
|
|
917
|
+
},
|
|
918
|
+
"trigger_count": 15,
|
|
919
|
+
"atlas_count": 1,
|
|
920
|
+
"attack_count": 4,
|
|
921
|
+
"framework_gap_count": 4,
|
|
922
|
+
"cwe_count": 4,
|
|
923
|
+
"d3fend_count": 0,
|
|
924
|
+
"rfc_count": 0,
|
|
925
|
+
"last_threat_review": "2026-05-11",
|
|
926
|
+
"path": "skills/ot-ics-security/skill.md",
|
|
927
|
+
"handoff_targets": [
|
|
928
|
+
"ai-attack-surface",
|
|
929
|
+
"attack-surface-pentest",
|
|
930
|
+
"compliance-theater",
|
|
931
|
+
"defensive-countermeasure-mapping",
|
|
932
|
+
"framework-gap-analysis",
|
|
933
|
+
"global-grc",
|
|
934
|
+
"identity-assurance",
|
|
935
|
+
"kernel-lpe-triage",
|
|
936
|
+
"mcp-agent-trust",
|
|
937
|
+
"policy-exception-gen",
|
|
938
|
+
"supply-chain-integrity"
|
|
939
|
+
]
|
|
940
|
+
},
|
|
941
|
+
"coordinated-vuln-disclosure": {
|
|
942
|
+
"description": "Coordinated Vulnerability Disclosure for mid-2026 — ISO 29147 (disclosure) + ISO 30111 (handling) + VDP + bug bounty + CSAF 2.0 advisories + security.txt + EU CRA / NIS2 regulator-mandated disclosure + AI vulnerability classes",
|
|
943
|
+
"threat_context_excerpt": "CVD is no longer optional, and \"we have a security@ alias\" is no longer a program.",
|
|
944
|
+
"produces": "The skill produces seven artifacts per program assessment:\n\n### 1. CVD Policy Text (ISO 29147 template)\n\n```\n# Coordinated Vulnerability Disclosure Policy — <Organization>\n\n## Scope\nIn scope: <list of products / services / AI systems>\nOut of scope: <list of assets / behaviors>\nAI-systems statement: <explicit scope for model behavior, prompt-injection classes,\ntraining-data, RAG corpora, agent toolchains — or explicit exclusion>\n\n## Safe Harbor\nWe will not pursue legal action for security research conducted in good faith\nwithin the scope and rules below. Specifically: ...\n\n## How to Report\nCont ...",
|
|
945
|
+
"key_xrefs": {
|
|
946
|
+
"cwe_refs": [
|
|
947
|
+
"CWE-1357"
|
|
948
|
+
],
|
|
949
|
+
"d3fend_refs": [],
|
|
950
|
+
"framework_gaps": [
|
|
951
|
+
"NIST-800-218-SSDF",
|
|
952
|
+
"ISO-27001-2022-A.8.8",
|
|
953
|
+
"SOC2-CC9-vendor-management"
|
|
954
|
+
],
|
|
955
|
+
"atlas_refs": [],
|
|
956
|
+
"attack_refs": [],
|
|
957
|
+
"rfc_refs": [],
|
|
958
|
+
"dlp_refs": []
|
|
959
|
+
},
|
|
960
|
+
"trigger_count": 12,
|
|
961
|
+
"atlas_count": 0,
|
|
962
|
+
"attack_count": 0,
|
|
963
|
+
"framework_gap_count": 3,
|
|
964
|
+
"cwe_count": 1,
|
|
965
|
+
"d3fend_count": 0,
|
|
966
|
+
"rfc_count": 0,
|
|
967
|
+
"last_threat_review": "2026-05-11",
|
|
968
|
+
"path": "skills/coordinated-vuln-disclosure/skill.md",
|
|
969
|
+
"handoff_targets": [
|
|
970
|
+
"attack-surface-pentest",
|
|
971
|
+
"compliance-theater",
|
|
972
|
+
"defensive-countermeasure-mapping",
|
|
973
|
+
"exploit-scoring",
|
|
974
|
+
"framework-gap-analysis",
|
|
975
|
+
"fuzz-testing-strategy",
|
|
976
|
+
"global-grc",
|
|
977
|
+
"supply-chain-integrity",
|
|
978
|
+
"zeroday-gap-learn"
|
|
979
|
+
]
|
|
980
|
+
},
|
|
981
|
+
"threat-modeling-methodology": {
|
|
982
|
+
"description": "Threat modeling methodologies for mid-2026 — STRIDE, PASTA, LINDDUN (privacy), Cyber Kill Chain, Diamond Model, MITRE Unified Kill Chain, AI-system threat modeling, agent-based threat modeling",
|
|
983
|
+
"threat_context_excerpt": "Most \"threat models\" in circulation in mid-2026 are STRIDE diagrams of 2018–2022 vintage. Their failure modes are concrete and current:",
|
|
984
|
+
"produces": "```\n## Threat Model — <system name>\n**Date:** YYYY-MM-DD\n**Methodology:** <STRIDE-ML + LINDDUN + Diamond | Unified Kill Chain v3.0 | composite ...>\n**Methodology rationale:** <why this combination, not others>\n**Currency triggers:** <list of upstream changes that will require re-run>\n\n### 1. Scope and Actor Inventory\n| Actor | Type (human/service/AI/data) | Trust boundary | Minimum-scope authorisation | Notes |\n|---|---|---|---|---|\n\n### 2. AI / Agent Inventory (required if any AI actor present)\n| Agent | Runtime | Tool-call surface | Plugins / MCP servers | Decides on its own | Escalates to | ...",
|
|
985
|
+
"key_xrefs": {
|
|
986
|
+
"cwe_refs": [],
|
|
987
|
+
"d3fend_refs": [],
|
|
988
|
+
"framework_gaps": [
|
|
989
|
+
"ISO-27001-2022-A.8.28",
|
|
990
|
+
"ISO-IEC-23894-2023-clause-7",
|
|
991
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
992
|
+
"NIST-800-218-SSDF"
|
|
993
|
+
],
|
|
994
|
+
"atlas_refs": [],
|
|
995
|
+
"attack_refs": [],
|
|
996
|
+
"rfc_refs": [],
|
|
997
|
+
"dlp_refs": []
|
|
998
|
+
},
|
|
999
|
+
"trigger_count": 13,
|
|
1000
|
+
"atlas_count": 0,
|
|
1001
|
+
"attack_count": 0,
|
|
1002
|
+
"framework_gap_count": 4,
|
|
1003
|
+
"cwe_count": 0,
|
|
1004
|
+
"d3fend_count": 0,
|
|
1005
|
+
"rfc_count": 0,
|
|
1006
|
+
"last_threat_review": "2026-05-11",
|
|
1007
|
+
"path": "skills/threat-modeling-methodology/skill.md",
|
|
1008
|
+
"handoff_targets": [
|
|
1009
|
+
"ai-attack-surface",
|
|
1010
|
+
"defensive-countermeasure-mapping",
|
|
1011
|
+
"framework-gap-analysis",
|
|
1012
|
+
"mcp-agent-trust",
|
|
1013
|
+
"rag-pipeline-security",
|
|
1014
|
+
"researcher",
|
|
1015
|
+
"threat-model-currency",
|
|
1016
|
+
"zeroday-gap-learn"
|
|
1017
|
+
]
|
|
1018
|
+
},
|
|
1019
|
+
"webapp-security": {
|
|
1020
|
+
"description": "Web application security for mid-2026 — OWASP Top 10 2025, OWASP ASVS v5, CWE root-cause coverage, AI-generated code weakness drift, server-rendered vs SPA tradeoffs, defense-in-depth across the request lifecycle",
|
|
1021
|
+
"threat_context_excerpt": "Webapps still ship CWE-79 (Cross-Site Scripting), CWE-89 (SQL Injection), and CWE-22 (Path Traversal) at rates the industry was supposed to have engineered out of existence by 2018. The reason is not mystery — it is AI codegen drift. Coding assistants (GitHub Copilot, Cursor, Windsurf, Claude Code, Codex, Gemini Code Assist) reintroduce OWASP-Top-10-class weaknesses into new code at roughly the rate human review removed them during the 2010s. Industry analysis published in early 2026 across several large-codebase studies converges on the same order of magnitude: approximately **30% of ...",
|
|
1022
|
+
"produces": "```\n## Web Application Security Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Scope:** [app/repo names, route count, in-scope environments]\n**ASVS Target Level:** [L1 / L2 / L3, with justification by data sensitivity]\n\n### Per-Route Risk Matrix\n| Route | Auth Required | Data Class | CWE Root-Cause Risks | Current Controls | AI-Codegen Blast Radius | RWEP | Remediation |\n|-------|---------------|------------|----------------------|------------------|-------------------------|------|-------------|\n| POST /api/upload | role:editor | regulated | CWE-434, CWE-22, CWE-78 | content-type allowlist; ma ...",
|
|
1023
|
+
"key_xrefs": {
|
|
1024
|
+
"cwe_refs": [
|
|
1025
|
+
"CWE-22",
|
|
1026
|
+
"CWE-77",
|
|
1027
|
+
"CWE-78",
|
|
1028
|
+
"CWE-79",
|
|
1029
|
+
"CWE-89",
|
|
1030
|
+
"CWE-94",
|
|
1031
|
+
"CWE-200",
|
|
1032
|
+
"CWE-269",
|
|
1033
|
+
"CWE-287",
|
|
1034
|
+
"CWE-352",
|
|
1035
|
+
"CWE-434",
|
|
1036
|
+
"CWE-502",
|
|
1037
|
+
"CWE-732",
|
|
1038
|
+
"CWE-862",
|
|
1039
|
+
"CWE-863",
|
|
1040
|
+
"CWE-918",
|
|
1041
|
+
"CWE-1188"
|
|
1042
|
+
],
|
|
1043
|
+
"d3fend_refs": [],
|
|
1044
|
+
"framework_gaps": [
|
|
1045
|
+
"OWASP-ASVS-v5.0-V14",
|
|
1046
|
+
"OWASP-LLM-Top-10-2025-LLM01",
|
|
1047
|
+
"NIST-800-218-SSDF",
|
|
1048
|
+
"ISO-27001-2022-A.8.28"
|
|
1049
|
+
],
|
|
1050
|
+
"atlas_refs": [
|
|
1051
|
+
"AML.T0051"
|
|
1052
|
+
],
|
|
1053
|
+
"attack_refs": [
|
|
1054
|
+
"T1190",
|
|
1055
|
+
"T1059",
|
|
1056
|
+
"T1505"
|
|
1057
|
+
],
|
|
1058
|
+
"rfc_refs": [
|
|
1059
|
+
"RFC-8446",
|
|
1060
|
+
"RFC-9114",
|
|
1061
|
+
"RFC-7519",
|
|
1062
|
+
"RFC-8725"
|
|
1063
|
+
],
|
|
1064
|
+
"dlp_refs": []
|
|
1065
|
+
},
|
|
1066
|
+
"trigger_count": 15,
|
|
1067
|
+
"atlas_count": 1,
|
|
1068
|
+
"attack_count": 3,
|
|
1069
|
+
"framework_gap_count": 4,
|
|
1070
|
+
"cwe_count": 17,
|
|
1071
|
+
"d3fend_count": 0,
|
|
1072
|
+
"rfc_count": 4,
|
|
1073
|
+
"last_threat_review": "2026-05-11",
|
|
1074
|
+
"path": "skills/webapp-security/skill.md",
|
|
1075
|
+
"handoff_targets": [
|
|
1076
|
+
"ai-attack-surface",
|
|
1077
|
+
"ai-c2-detection",
|
|
1078
|
+
"attack-surface-pentest",
|
|
1079
|
+
"defensive-countermeasure-mapping",
|
|
1080
|
+
"fuzz-testing-strategy",
|
|
1081
|
+
"identity-assurance",
|
|
1082
|
+
"supply-chain-integrity",
|
|
1083
|
+
"threat-modeling-methodology"
|
|
1084
|
+
]
|
|
1085
|
+
},
|
|
1086
|
+
"ai-risk-management": {
|
|
1087
|
+
"description": "AI governance and risk management for mid-2026 — ISO/IEC 23894 risk process, ISO/IEC 42001 management system, NIST AI RMF, EU AI Act high-risk obligations, AI impact assessments, AI red-team programs, AI incident lifecycle",
|
|
1088
|
+
"threat_context_excerpt": "AI governance moved from voluntary to mandatory between 2024 and 2026. The transition has three concrete dates that anchor the current state of the practice:",
|
|
1089
|
+
"produces": "```\n## AI Risk Management Programme — <organisation / scope>\n**Assessment Date:** YYYY-MM-DD\n**Standards in scope:** ISO/IEC 42001:2023 | ISO/IEC 23894:2023 | NIST AI RMF 1.0 | EU AI Act (2024/1689) | <jurisdiction-specific frameworks>\n**EU AI Act enforcement reference date:** 2026-08-02 (high-risk system obligations fully enforceable)\n\n### 1. AI Inventory Ledger\n| ID | Name | Owner | Runtime | Data tier | EU AI Act risk tier | Personal data? | Tool-call surface | MCP servers | Dependencies |\n|---|---|---|---|---|---|---|---|---|---|\n\n### 2. AI Impact Assessment Register\n| Use case ID | EU AI ...",
|
|
1090
|
+
"key_xrefs": {
|
|
1091
|
+
"cwe_refs": [
|
|
1092
|
+
"CWE-1426",
|
|
1093
|
+
"CWE-1039"
|
|
1094
|
+
],
|
|
1095
|
+
"d3fend_refs": [],
|
|
1096
|
+
"framework_gaps": [
|
|
1097
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
1098
|
+
"ISO-IEC-23894-2023-clause-7",
|
|
1099
|
+
"NIST-AI-RMF-MEASURE-2.5",
|
|
1100
|
+
"OWASP-LLM-Top-10-2025-LLM01"
|
|
1101
|
+
],
|
|
1102
|
+
"atlas_refs": [
|
|
1103
|
+
"AML.T0051",
|
|
1104
|
+
"AML.T0096",
|
|
1105
|
+
"AML.T0017"
|
|
1106
|
+
],
|
|
1107
|
+
"attack_refs": [],
|
|
1108
|
+
"rfc_refs": [],
|
|
1109
|
+
"dlp_refs": []
|
|
1110
|
+
},
|
|
1111
|
+
"trigger_count": 13,
|
|
1112
|
+
"atlas_count": 3,
|
|
1113
|
+
"attack_count": 0,
|
|
1114
|
+
"framework_gap_count": 4,
|
|
1115
|
+
"cwe_count": 2,
|
|
1116
|
+
"d3fend_count": 0,
|
|
1117
|
+
"rfc_count": 0,
|
|
1118
|
+
"last_threat_review": "2026-05-11",
|
|
1119
|
+
"path": "skills/ai-risk-management/skill.md",
|
|
1120
|
+
"handoff_targets": [
|
|
1121
|
+
"ai-attack-surface",
|
|
1122
|
+
"compliance-theater",
|
|
1123
|
+
"coordinated-vuln-disclosure",
|
|
1124
|
+
"dlp-gap-analysis",
|
|
1125
|
+
"framework-gap-analysis",
|
|
1126
|
+
"global-grc",
|
|
1127
|
+
"identity-assurance",
|
|
1128
|
+
"mcp-agent-trust",
|
|
1129
|
+
"rag-pipeline-security",
|
|
1130
|
+
"threat-modeling-methodology",
|
|
1131
|
+
"zeroday-gap-learn"
|
|
1132
|
+
]
|
|
1133
|
+
},
|
|
1134
|
+
"sector-healthcare": {
|
|
1135
|
+
"description": "Healthcare sector cybersecurity for mid-2026 — HIPAA + HITRUST + HL7 FHIR security, medical device cyber (FDA + EU MDR), AI-in-healthcare under EU AI Act + FDA AI/ML SaMD guidance, patient data flows through LLM clinical tools",
|
|
1136
|
+
"threat_context_excerpt": "Healthcare has been the most targeted sector for ransomware for three consecutive years, and that ranking has not changed entering mid-2026:",
|
|
1137
|
+
"produces": "Produce this structure verbatim:\n\n```\n## Healthcare Sector Security Posture Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Entity:** [name] (covered entity / business associate / device vendor / digital-health platform)\n**Scope:** [e.g., EHR + ambient-doc pilots + 3 device families; HMO national; payer + provider arms]\n**Regulatory jurisdictions:** [US HHS-OCR + FDA, EU AI Act + MDR, UK ICO + MHRA, ...]\n\n### HIPAA Technical-Safeguard Scorecard\n| §164.312 Control | Implementation | Adequacy vs current TTPs | Theater Risk |\n|------------------|----------------|--------------------------|--------- ...",
|
|
1138
|
+
"key_xrefs": {
|
|
1139
|
+
"cwe_refs": [
|
|
1140
|
+
"CWE-200",
|
|
1141
|
+
"CWE-287",
|
|
1142
|
+
"CWE-862",
|
|
1143
|
+
"CWE-1426"
|
|
1144
|
+
],
|
|
1145
|
+
"d3fend_refs": [],
|
|
1146
|
+
"framework_gaps": [
|
|
1147
|
+
"HIPAA-Security-Rule-164.312(a)(1)",
|
|
1148
|
+
"HITRUST-CSF-v11.4-09.l",
|
|
1149
|
+
"ISO-27001-2022-A.8.30",
|
|
1150
|
+
"NIST-800-53-AC-2"
|
|
1151
|
+
],
|
|
1152
|
+
"atlas_refs": [
|
|
1153
|
+
"AML.T0051",
|
|
1154
|
+
"AML.T0017"
|
|
1155
|
+
],
|
|
1156
|
+
"attack_refs": [
|
|
1157
|
+
"T1078",
|
|
1158
|
+
"T1530",
|
|
1159
|
+
"T1567"
|
|
1160
|
+
],
|
|
1161
|
+
"rfc_refs": [
|
|
1162
|
+
"RFC-7519",
|
|
1163
|
+
"RFC-9421"
|
|
1164
|
+
],
|
|
1165
|
+
"dlp_refs": []
|
|
1166
|
+
},
|
|
1167
|
+
"trigger_count": 14,
|
|
1168
|
+
"atlas_count": 2,
|
|
1169
|
+
"attack_count": 3,
|
|
1170
|
+
"framework_gap_count": 4,
|
|
1171
|
+
"cwe_count": 4,
|
|
1172
|
+
"d3fend_count": 0,
|
|
1173
|
+
"rfc_count": 2,
|
|
1174
|
+
"last_threat_review": "2026-05-11",
|
|
1175
|
+
"path": "skills/sector-healthcare/skill.md",
|
|
1176
|
+
"handoff_targets": [
|
|
1177
|
+
"ai-attack-surface",
|
|
1178
|
+
"compliance-theater",
|
|
1179
|
+
"coordinated-vuln-disclosure",
|
|
1180
|
+
"dlp-gap-analysis",
|
|
1181
|
+
"exploit-scoring",
|
|
1182
|
+
"framework-gap-analysis",
|
|
1183
|
+
"global-grc",
|
|
1184
|
+
"identity-assurance",
|
|
1185
|
+
"mcp-agent-trust",
|
|
1186
|
+
"ot-ics-security",
|
|
1187
|
+
"policy-exception-gen",
|
|
1188
|
+
"supply-chain-integrity"
|
|
1189
|
+
]
|
|
1190
|
+
},
|
|
1191
|
+
"sector-financial": {
|
|
1192
|
+
"description": "Financial services cybersecurity for mid-2026 — EU DORA TLPT, PSD2 RTS-SCA, SWIFT CSCF v2026, NYDFS 23 NYCRR 500, FFIEC CAT, MAS TRM, APRA CPS 234, IL BoI Directive 361, OSFI B-13; Threat-Led Pen Testing schemes TIBER-EU + CBEST + iCAST",
|
|
1193
|
+
"threat_context_excerpt": "Financial services is the most-regulated sector for cybersecurity globally and the regulation cadence is accelerating, not slowing. As of mid-2026 every Tier-1 bank, payments processor, broker-dealer, insurer, and significant financial-market infrastructure operates under multiple binding cyber regimes simultaneously. The threat landscape that drives those regimes has shifted materially since 2023.",
|
|
1194
|
+
"produces": "Produce this structure verbatim:\n\n```\n## Financial Sector Cybersecurity Posture Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Institution / Entity:** [name]\n**Regulatory exposure:** [EU DORA / UK FCA+PRA / US NYDFS / AU APRA / SG MAS / HK HKMA / IL BoI / CA OSFI / JP FISC / BR BCB / ...]\n**Critical or important functions in scope:** [list per DORA Art. 8 / equivalent]\n\n### DORA Register of Information Snapshot (where applicable)\n| ICT Third-Party | Service | Critical/Important Function Supported | Concentration Risk | Exit Strategy | Last Assessment |\n\n### PSD2 RTS-SCA Evidence Pack\n| Payment ...",
|
|
1195
|
+
"key_xrefs": {
|
|
1196
|
+
"cwe_refs": [
|
|
1197
|
+
"CWE-287",
|
|
1198
|
+
"CWE-862",
|
|
1199
|
+
"CWE-863",
|
|
1200
|
+
"CWE-798",
|
|
1201
|
+
"CWE-352"
|
|
1202
|
+
],
|
|
1203
|
+
"d3fend_refs": [],
|
|
1204
|
+
"framework_gaps": [
|
|
1205
|
+
"PSD2-RTS-SCA",
|
|
1206
|
+
"SWIFT-CSCF-v2026-1.1",
|
|
1207
|
+
"NIST-800-53-AC-2",
|
|
1208
|
+
"SOC2-CC6-logical-access"
|
|
1209
|
+
],
|
|
1210
|
+
"atlas_refs": [
|
|
1211
|
+
"AML.T0096",
|
|
1212
|
+
"AML.T0017"
|
|
1213
|
+
],
|
|
1214
|
+
"attack_refs": [
|
|
1215
|
+
"T1078",
|
|
1216
|
+
"T1190",
|
|
1217
|
+
"T1486",
|
|
1218
|
+
"T1567"
|
|
1219
|
+
],
|
|
1220
|
+
"rfc_refs": [
|
|
1221
|
+
"RFC-8446",
|
|
1222
|
+
"RFC-7519",
|
|
1223
|
+
"RFC-8725",
|
|
1224
|
+
"RFC-9421"
|
|
1225
|
+
],
|
|
1226
|
+
"dlp_refs": []
|
|
1227
|
+
},
|
|
1228
|
+
"trigger_count": 17,
|
|
1229
|
+
"atlas_count": 2,
|
|
1230
|
+
"attack_count": 4,
|
|
1231
|
+
"framework_gap_count": 4,
|
|
1232
|
+
"cwe_count": 5,
|
|
1233
|
+
"d3fend_count": 0,
|
|
1234
|
+
"rfc_count": 4,
|
|
1235
|
+
"last_threat_review": "2026-05-11",
|
|
1236
|
+
"path": "skills/sector-financial/skill.md",
|
|
1237
|
+
"handoff_targets": [
|
|
1238
|
+
"ai-attack-surface",
|
|
1239
|
+
"attack-surface-pentest",
|
|
1240
|
+
"compliance-theater",
|
|
1241
|
+
"coordinated-vuln-disclosure",
|
|
1242
|
+
"dlp-gap-analysis",
|
|
1243
|
+
"framework-gap-analysis",
|
|
1244
|
+
"global-grc",
|
|
1245
|
+
"identity-assurance",
|
|
1246
|
+
"mcp-agent-trust",
|
|
1247
|
+
"policy-exception-gen",
|
|
1248
|
+
"supply-chain-integrity"
|
|
1249
|
+
]
|
|
1250
|
+
},
|
|
1251
|
+
"sector-federal-government": {
|
|
1252
|
+
"description": "Federal government + defense contractor cybersecurity for mid-2026 — FedRAMP Rev5, CMMC 2.0, EO 14028, NIST 800-171/172 CUI, FISMA, M-22-09 federal Zero Trust, OMB M-24-04 AI risk, CISA BOD/ED; cross-jurisdiction NCSC UK, ENISA EUCC, AU PSPF, IL government cyber methodology",
|
|
1253
|
+
"threat_context_excerpt": "Federal government and defense industrial base (DIB) cybersecurity in mid-2026 is defined by five overlapping transformations driven by Executive Order 14028 (May 2021) and its successor directives:",
|
|
1254
|
+
"produces": "```\n## Federal Government / DIB Cybersecurity Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Scope:** [federal agency / DIB contractor / federal cloud workload / multi-jurisdiction government]\n**Baselines in scope:** [FedRAMP Rev5 Moderate | FedRAMP Rev5 High | CMMC 2.0 Level 1/2/3 | NIST 800-171 Rev 2/3 | NIST 800-172 | FISMA | M-22-09 | M-24-04 | UK GovAssure | EU NIS2 public admin | AU PSPF/ISM E8 | IL CDM v2.1]\n**Phased rollout exposure (CMMC):** [Phase 1 / 2 / 3 / 4]\n\n### FedRAMP Package Status\n| Attribute | Value | Gap |\n| Authorization type | JAB P-ATO / Agency ATO | |\n| Baseline | Moder ...",
|
|
1255
|
+
"key_xrefs": {
|
|
1256
|
+
"cwe_refs": [
|
|
1257
|
+
"CWE-1357",
|
|
1258
|
+
"CWE-1395",
|
|
1259
|
+
"CWE-829"
|
|
1260
|
+
],
|
|
1261
|
+
"d3fend_refs": [],
|
|
1262
|
+
"framework_gaps": [
|
|
1263
|
+
"FedRAMP-Rev5-Moderate",
|
|
1264
|
+
"CMMC-2.0-Level-2",
|
|
1265
|
+
"NIST-800-218-SSDF",
|
|
1266
|
+
"SLSA-v1.0-Build-L3"
|
|
1267
|
+
],
|
|
1268
|
+
"atlas_refs": [],
|
|
1269
|
+
"attack_refs": [
|
|
1270
|
+
"T1190",
|
|
1271
|
+
"T1195.001",
|
|
1272
|
+
"T1554"
|
|
1273
|
+
],
|
|
1274
|
+
"rfc_refs": [
|
|
1275
|
+
"RFC-8032",
|
|
1276
|
+
"RFC-8446"
|
|
1277
|
+
],
|
|
1278
|
+
"dlp_refs": []
|
|
1279
|
+
},
|
|
1280
|
+
"trigger_count": 16,
|
|
1281
|
+
"atlas_count": 0,
|
|
1282
|
+
"attack_count": 3,
|
|
1283
|
+
"framework_gap_count": 4,
|
|
1284
|
+
"cwe_count": 3,
|
|
1285
|
+
"d3fend_count": 0,
|
|
1286
|
+
"rfc_count": 2,
|
|
1287
|
+
"last_threat_review": "2026-05-11",
|
|
1288
|
+
"path": "skills/sector-federal-government/skill.md",
|
|
1289
|
+
"handoff_targets": [
|
|
1290
|
+
"ai-attack-surface",
|
|
1291
|
+
"ai-c2-detection",
|
|
1292
|
+
"attack-surface-pentest",
|
|
1293
|
+
"compliance-theater",
|
|
1294
|
+
"framework-gap-analysis",
|
|
1295
|
+
"global-grc",
|
|
1296
|
+
"identity-assurance",
|
|
1297
|
+
"pqc-first",
|
|
1298
|
+
"supply-chain-integrity"
|
|
1299
|
+
]
|
|
1300
|
+
},
|
|
1301
|
+
"sector-energy": {
|
|
1302
|
+
"description": "Electric power + oil & gas + water/wastewater + renewable-integration cybersecurity for mid-2026 — NERC CIP v6/v7, NIST 800-82r3, TSA Pipeline SD-2021-02C, AWWA cyber, EU NIS2 energy + NCCS-G (cross-border electricity), AU AESCSF + SOCI, ENISA energy sector",
|
|
1303
|
+
"threat_context_excerpt": "State-sponsored targeting of energy infrastructure has escalated, not plateaued.",
|
|
1304
|
+
"produces": "Produce this structure verbatim:\n\n```\n## Energy-Sector Cybersecurity Posture Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Operator / Site:** [name]\n**Sub-sector(s):** [electric T&D / generation / market ops / pipeline / water / DER aggregation / EV charging]\n**Regulatory jurisdictions:** [US/NERC + TSA + AWWA + state PUCs; EU/NIS2 + NCCS-G + CER; UK/CAF; AU/SOCI+AESCSF; JP/NISC+METI; IL/INCD; other]\n\n### Asset Class Inventory (Purdue + Energy Overlay)\n| Class | Count | Vendor Mix | Protocol Mix | IEC 62351 Status | Avg Age (years) | Patch Posture |\n|-------|-------|------------|-------------- ...",
|
|
1305
|
+
"key_xrefs": {
|
|
1306
|
+
"cwe_refs": [
|
|
1307
|
+
"CWE-287",
|
|
1308
|
+
"CWE-798",
|
|
1309
|
+
"CWE-306",
|
|
1310
|
+
"CWE-1037"
|
|
1311
|
+
],
|
|
1312
|
+
"d3fend_refs": [],
|
|
1313
|
+
"framework_gaps": [
|
|
1314
|
+
"NERC-CIP-007-6-R4",
|
|
1315
|
+
"NIST-800-82r3",
|
|
1316
|
+
"IEC-62443-3-3",
|
|
1317
|
+
"NIS2-Art21-patch-management"
|
|
1318
|
+
],
|
|
1319
|
+
"atlas_refs": [],
|
|
1320
|
+
"attack_refs": [
|
|
1321
|
+
"T0855",
|
|
1322
|
+
"T0883",
|
|
1323
|
+
"T1190",
|
|
1324
|
+
"T1078"
|
|
1325
|
+
],
|
|
1326
|
+
"rfc_refs": [],
|
|
1327
|
+
"dlp_refs": []
|
|
1328
|
+
},
|
|
1329
|
+
"trigger_count": 15,
|
|
1330
|
+
"atlas_count": 0,
|
|
1331
|
+
"attack_count": 4,
|
|
1332
|
+
"framework_gap_count": 4,
|
|
1333
|
+
"cwe_count": 4,
|
|
1334
|
+
"d3fend_count": 0,
|
|
1335
|
+
"rfc_count": 0,
|
|
1336
|
+
"last_threat_review": "2026-05-11",
|
|
1337
|
+
"path": "skills/sector-energy/skill.md",
|
|
1338
|
+
"handoff_targets": [
|
|
1339
|
+
"ai-attack-surface",
|
|
1340
|
+
"attack-surface-pentest",
|
|
1341
|
+
"compliance-theater",
|
|
1342
|
+
"coordinated-vuln-disclosure",
|
|
1343
|
+
"framework-gap-analysis",
|
|
1344
|
+
"global-grc",
|
|
1345
|
+
"identity-assurance",
|
|
1346
|
+
"kernel-lpe-triage",
|
|
1347
|
+
"mcp-agent-trust",
|
|
1348
|
+
"ot-ics-security",
|
|
1349
|
+
"policy-exception-gen",
|
|
1350
|
+
"rag-pipeline-security",
|
|
1351
|
+
"supply-chain-integrity"
|
|
1352
|
+
]
|
|
1353
|
+
},
|
|
1354
|
+
"api-security": {
|
|
1355
|
+
"description": "API security for mid-2026 — OWASP API Top 10 2023, AI-API specific (rate limits, prompt-shape egress, MCP HTTP transport), GraphQL + gRPC + REST + WebSocket attack surfaces, API gateway posture, BOLA/BFLA/SSRF/Mass Assignment",
|
|
1356
|
+
"threat_context_excerpt": "APIs are now the integration substrate of every non-trivial system. The mid-2026 enterprise app is a thin shell of UI calling a fan-out of REST, GraphQL, gRPC, and WebSocket APIs — many of which themselves call **AI-API services** (OpenAI, Anthropic, Google Gemini, AWS Bedrock, Azure OpenAI) on the user's behalf. Legacy web-application firewalls were built for HTML form posts and inspect REST badly, GraphQL barely, gRPC binary framing not at all, and AI-API egress not at all. The defensive perimeter has moved from the WAF to the **API gateway and the egress policy**.",
|
|
1357
|
+
"produces": "```\n## API Security Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Scope:** [API surfaces in scope — REST / GraphQL / gRPC / WebSocket / MCP — environments]\n**OWASP API Top 10 2023 Target:** [verification level + justification by data sensitivity]\n\n### API Inventory (by Protocol)\n| Protocol | Endpoint / Service | Auth Model | Schema Source | Data Class | AI-API Consumption | Provenance | Inventory Status |\n|----------|--------------------|------------|---------------|------------|--------------------|------------|------------------|\n| REST | GET /api/v1/orders/{id} | OAuth bearer (JWT) | OpenAP ...",
|
|
1358
|
+
"key_xrefs": {
|
|
1359
|
+
"cwe_refs": [
|
|
1360
|
+
"CWE-287",
|
|
1361
|
+
"CWE-862",
|
|
1362
|
+
"CWE-863",
|
|
1363
|
+
"CWE-918",
|
|
1364
|
+
"CWE-200",
|
|
1365
|
+
"CWE-352",
|
|
1366
|
+
"CWE-22",
|
|
1367
|
+
"CWE-77",
|
|
1368
|
+
"CWE-1188"
|
|
1369
|
+
],
|
|
1370
|
+
"d3fend_refs": [],
|
|
1371
|
+
"framework_gaps": [
|
|
1372
|
+
"OWASP-ASVS-v5.0-V14",
|
|
1373
|
+
"NIST-800-218-SSDF",
|
|
1374
|
+
"ISO-27001-2022-A.8.28",
|
|
1375
|
+
"NIST-800-53-AC-2"
|
|
1376
|
+
],
|
|
1377
|
+
"atlas_refs": [
|
|
1378
|
+
"AML.T0096",
|
|
1379
|
+
"AML.T0017"
|
|
1380
|
+
],
|
|
1381
|
+
"attack_refs": [
|
|
1382
|
+
"T1190",
|
|
1383
|
+
"T1078",
|
|
1384
|
+
"T1567"
|
|
1385
|
+
],
|
|
1386
|
+
"rfc_refs": [
|
|
1387
|
+
"RFC-8446",
|
|
1388
|
+
"RFC-9114",
|
|
1389
|
+
"RFC-7519",
|
|
1390
|
+
"RFC-8725",
|
|
1391
|
+
"RFC-6749",
|
|
1392
|
+
"RFC-9700",
|
|
1393
|
+
"RFC-9421"
|
|
1394
|
+
],
|
|
1395
|
+
"dlp_refs": []
|
|
1396
|
+
},
|
|
1397
|
+
"trigger_count": 14,
|
|
1398
|
+
"atlas_count": 2,
|
|
1399
|
+
"attack_count": 3,
|
|
1400
|
+
"framework_gap_count": 4,
|
|
1401
|
+
"cwe_count": 9,
|
|
1402
|
+
"d3fend_count": 0,
|
|
1403
|
+
"rfc_count": 7,
|
|
1404
|
+
"last_threat_review": "2026-05-11",
|
|
1405
|
+
"path": "skills/api-security/skill.md",
|
|
1406
|
+
"handoff_targets": [
|
|
1407
|
+
"ai-c2-detection",
|
|
1408
|
+
"defensive-countermeasure-mapping",
|
|
1409
|
+
"dlp-gap-analysis",
|
|
1410
|
+
"identity-assurance",
|
|
1411
|
+
"mcp-agent-trust",
|
|
1412
|
+
"webapp-security"
|
|
1413
|
+
]
|
|
1414
|
+
},
|
|
1415
|
+
"cloud-security": {
|
|
1416
|
+
"description": "Cloud security for mid-2026 — CSPM/CWPP/CNAPP posture, CSA CCM v4, AWS/Azure/GCP shared responsibility, cloud workload identity federation, runtime security with eBPF, AI workloads on cloud",
|
|
1417
|
+
"threat_context_excerpt": "Cloud is where AI runs. Every consequential AI service — OpenAI, Anthropic, Google Gemini, AWS Bedrock, Azure OpenAI, GCP Vertex AI — is a multi-tenant cloud workload. Every enterprise that consumes those services is exposing some portion of its corpus, its prompts, and its access tokens across a shared-tenancy boundary that the consumer does not administer. Every enterprise that hosts its own AI inference (Bedrock with custom models, Azure OpenAI deployments, SageMaker endpoints, Vertex endpoints, GKE/EKS/AKS-hosted vLLM / TGI / Triton) inherits the full posture of the underlying cloud ...",
|
|
1418
|
+
"produces": "Produce this structure verbatim:\n\n```\n## Cloud Security Posture Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Operator:** [name]\n**Clouds in scope:** [AWS, Azure, GCP, OCI, Alibaba, ...]\n**AI-service providers in scope:** [Bedrock, Azure OpenAI, Vertex, OpenAI, Anthropic, ...]\n**Regulatory jurisdictions:** [US/FedRAMP/NYDFS, EU/NIS2/DORA/GDPR, UK/GovAssure, AU/IRAP, JP/ISMAP, SG/MTCS, IN/MeitY, BR/LGPD, CN/MLPS2.0, ...]\n\n### Multi-Cloud Account Inventory\n| CSP | Accounts / Subscriptions / Projects | Regions Active | IaC Coverage | Governance (Org / MG / Folder) |\n\n### CSPM Scorecard (per accou ...",
|
|
1419
|
+
"key_xrefs": {
|
|
1420
|
+
"cwe_refs": [
|
|
1421
|
+
"CWE-287",
|
|
1422
|
+
"CWE-862",
|
|
1423
|
+
"CWE-732",
|
|
1424
|
+
"CWE-200",
|
|
1425
|
+
"CWE-1188",
|
|
1426
|
+
"CWE-798"
|
|
1427
|
+
],
|
|
1428
|
+
"d3fend_refs": [],
|
|
1429
|
+
"framework_gaps": [
|
|
1430
|
+
"NIST-800-53-CM-7",
|
|
1431
|
+
"ISO-27001-2022-A.8.30",
|
|
1432
|
+
"SOC2-CC9-vendor-management",
|
|
1433
|
+
"FedRAMP-Rev5-Moderate"
|
|
1434
|
+
],
|
|
1435
|
+
"atlas_refs": [
|
|
1436
|
+
"AML.T0010",
|
|
1437
|
+
"AML.T0017"
|
|
1438
|
+
],
|
|
1439
|
+
"attack_refs": [
|
|
1440
|
+
"T1078",
|
|
1441
|
+
"T1530",
|
|
1442
|
+
"T1190",
|
|
1443
|
+
"T1552"
|
|
1444
|
+
],
|
|
1445
|
+
"rfc_refs": [
|
|
1446
|
+
"RFC-8446",
|
|
1447
|
+
"RFC-9180",
|
|
1448
|
+
"RFC-7519",
|
|
1449
|
+
"RFC-8725"
|
|
1450
|
+
],
|
|
1451
|
+
"dlp_refs": []
|
|
1452
|
+
},
|
|
1453
|
+
"trigger_count": 15,
|
|
1454
|
+
"atlas_count": 2,
|
|
1455
|
+
"attack_count": 4,
|
|
1456
|
+
"framework_gap_count": 4,
|
|
1457
|
+
"cwe_count": 6,
|
|
1458
|
+
"d3fend_count": 0,
|
|
1459
|
+
"rfc_count": 4,
|
|
1460
|
+
"last_threat_review": "2026-05-11",
|
|
1461
|
+
"path": "skills/cloud-security/skill.md",
|
|
1462
|
+
"handoff_targets": [
|
|
1463
|
+
"ai-c2-detection",
|
|
1464
|
+
"api-security",
|
|
1465
|
+
"compliance-theater",
|
|
1466
|
+
"defensive-countermeasure-mapping",
|
|
1467
|
+
"dlp-gap-analysis",
|
|
1468
|
+
"framework-gap-analysis",
|
|
1469
|
+
"global-grc",
|
|
1470
|
+
"identity-assurance",
|
|
1471
|
+
"kernel-lpe-triage",
|
|
1472
|
+
"mcp-agent-trust",
|
|
1473
|
+
"policy-exception-gen",
|
|
1474
|
+
"supply-chain-integrity"
|
|
1475
|
+
]
|
|
1476
|
+
},
|
|
1477
|
+
"container-runtime-security": {
|
|
1478
|
+
"description": "Container + Kubernetes runtime security for mid-2026 — CIS K8s Benchmark, NSA/CISA Hardening, Pod Security Standards, Kyverno/Gatekeeper admission, Sigstore policy-controller, eBPF runtime detection (Falco/Tetragon), AI inference workload hardening",
|
|
1479
|
+
"threat_context_excerpt": "Kubernetes is no longer \"the cloud-native orchestrator.\" It is the AI inference runtime. KServe, vLLM, Triton Inference Server, Ray Serve, Seldon, BentoML, and the Hugging Face TGI / text-generation-inference family all ship as K8s workloads. Anywhere there is a production LLM endpoint in mid-2026 there is a K8s cluster underneath it, and the cluster's hardening posture is the LLM endpoint's hardening posture.",
|
|
1480
|
+
"produces": "Produce this structure verbatim:\n\n```\n## Container + Kubernetes Runtime Security Posture Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Cluster(s) in scope:** [cluster name + K8s version + distribution (EKS / GKE / AKS / OpenShift / Rancher / k0s / Talos / kubeadm) + node OS]\n**Workload classes in scope:** [general microservices / AI inference (KServe / vLLM / Triton / Ray Serve) / data / batch]\n**Regulatory jurisdictions:** [US / EU NIS2+CRA / UK NCSC CAF / AU ISM / IL INCD / SG GovTech / TW CSMA / sector-specific]\n\n### CIS Kubernetes Benchmark Scorecard\n| Section | Total Checks | Pass | Fail ...",
|
|
1481
|
+
"key_xrefs": {
|
|
1482
|
+
"cwe_refs": [
|
|
1483
|
+
"CWE-269",
|
|
1484
|
+
"CWE-732",
|
|
1485
|
+
"CWE-1188",
|
|
1486
|
+
"CWE-787",
|
|
1487
|
+
"CWE-1395"
|
|
1488
|
+
],
|
|
1489
|
+
"d3fend_refs": [],
|
|
1490
|
+
"framework_gaps": [
|
|
1491
|
+
"NIST-800-53-CM-7",
|
|
1492
|
+
"ISO-27001-2022-A.8.28",
|
|
1493
|
+
"SLSA-v1.0-Build-L3"
|
|
1494
|
+
],
|
|
1495
|
+
"atlas_refs": [
|
|
1496
|
+
"AML.T0010"
|
|
1497
|
+
],
|
|
1498
|
+
"attack_refs": [
|
|
1499
|
+
"T1610",
|
|
1500
|
+
"T1611",
|
|
1501
|
+
"T1068",
|
|
1502
|
+
"T1190"
|
|
1503
|
+
],
|
|
1504
|
+
"rfc_refs": [
|
|
1505
|
+
"RFC-8446",
|
|
1506
|
+
"RFC-8032"
|
|
1507
|
+
],
|
|
1508
|
+
"dlp_refs": []
|
|
1509
|
+
},
|
|
1510
|
+
"trigger_count": 17,
|
|
1511
|
+
"atlas_count": 1,
|
|
1512
|
+
"attack_count": 4,
|
|
1513
|
+
"framework_gap_count": 3,
|
|
1514
|
+
"cwe_count": 5,
|
|
1515
|
+
"d3fend_count": 0,
|
|
1516
|
+
"rfc_count": 2,
|
|
1517
|
+
"last_threat_review": "2026-05-11",
|
|
1518
|
+
"path": "skills/container-runtime-security/skill.md",
|
|
1519
|
+
"handoff_targets": [
|
|
1520
|
+
"ai-attack-surface",
|
|
1521
|
+
"ai-risk-management",
|
|
1522
|
+
"attack-surface-pentest",
|
|
1523
|
+
"cloud-security",
|
|
1524
|
+
"compliance-theater",
|
|
1525
|
+
"defensive-countermeasure-mapping",
|
|
1526
|
+
"framework-gap-analysis",
|
|
1527
|
+
"global-grc",
|
|
1528
|
+
"identity-assurance",
|
|
1529
|
+
"kernel-lpe-triage",
|
|
1530
|
+
"mcp-agent-trust",
|
|
1531
|
+
"mlops-security",
|
|
1532
|
+
"policy-exception-gen",
|
|
1533
|
+
"rag-pipeline-security",
|
|
1534
|
+
"sector-federal-government",
|
|
1535
|
+
"sector-financial",
|
|
1536
|
+
"supply-chain-integrity"
|
|
1537
|
+
]
|
|
1538
|
+
},
|
|
1539
|
+
"mlops-security": {
|
|
1540
|
+
"description": "MLOps pipeline security for mid-2026 — training data integrity, model registry signing, deployment pipeline provenance, inference serving hardening, drift detection, feedback loop integrity; covers MLflow / Kubeflow / Vertex AI / SageMaker / Azure ML / Hugging Face",
|
|
1541
|
+
"threat_context_excerpt": "MLOps replaced ad-hoc ML by 2023 — MLflow, Kubeflow Pipelines, Weights & Biases, Vertex AI Pipelines, SageMaker Pipelines, Azure ML Studio, and Hugging Face Hub are now the operational substrate for most production ML. By mid-2026, adversarial pressure has caught up. The MLOps lifecycle (data ingestion → feature store → training pipeline → experiment tracking → model registry → deployment pipeline → inference serving → monitoring → feedback loop) is now a contiguous supply chain whose every handoff is a documented attack class.",
|
|
1542
|
+
"produces": "```\n## MLOps Pipeline Security Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Scope:** [MLOps stack(s): MLflow / Kubeflow / Vertex AI / SageMaker / Azure ML / Hugging Face / DIY]\n**Models in Scope:** [count, classification, deployment surfaces]\n**Frameworks in scope:** [NIST 800-218 SSDF | SLSA v1.0 | ISO/IEC 42001:2023 | NIST AI RMF | OWASP LLM Top 10 | EU AI Act | UK DSIT AI Cyber Code | AU AI Safety Standard | JP Society Principles | IL INCD AI | SG AI Verify | IN MeitY draft | NYDFS Part 500]\n\n### MLOps Stack Inventory\n| Stage | Tooling | Hosted / Self-Managed | Auth Model | Notes |\n|---|-- ...",
|
|
1543
|
+
"key_xrefs": {
|
|
1544
|
+
"cwe_refs": [
|
|
1545
|
+
"CWE-1426",
|
|
1546
|
+
"CWE-1395",
|
|
1547
|
+
"CWE-1357",
|
|
1548
|
+
"CWE-502"
|
|
1549
|
+
],
|
|
1550
|
+
"d3fend_refs": [],
|
|
1551
|
+
"framework_gaps": [
|
|
1552
|
+
"NIST-800-218-SSDF",
|
|
1553
|
+
"SLSA-v1.0-Build-L3",
|
|
1554
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
1555
|
+
"NIST-AI-RMF-MEASURE-2.5",
|
|
1556
|
+
"OWASP-LLM-Top-10-2025-LLM08"
|
|
1557
|
+
],
|
|
1558
|
+
"atlas_refs": [
|
|
1559
|
+
"AML.T0010",
|
|
1560
|
+
"AML.T0018",
|
|
1561
|
+
"AML.T0020",
|
|
1562
|
+
"AML.T0043",
|
|
1563
|
+
"AML.T0017"
|
|
1564
|
+
],
|
|
1565
|
+
"attack_refs": [
|
|
1566
|
+
"T1195.001",
|
|
1567
|
+
"T1565"
|
|
1568
|
+
],
|
|
1569
|
+
"rfc_refs": [
|
|
1570
|
+
"RFC-8032"
|
|
1571
|
+
],
|
|
1572
|
+
"dlp_refs": []
|
|
1573
|
+
},
|
|
1574
|
+
"trigger_count": 16,
|
|
1575
|
+
"atlas_count": 5,
|
|
1576
|
+
"attack_count": 2,
|
|
1577
|
+
"framework_gap_count": 5,
|
|
1578
|
+
"cwe_count": 4,
|
|
1579
|
+
"d3fend_count": 0,
|
|
1580
|
+
"rfc_count": 1,
|
|
1581
|
+
"last_threat_review": "2026-05-11",
|
|
1582
|
+
"path": "skills/mlops-security/skill.md",
|
|
1583
|
+
"handoff_targets": [
|
|
1584
|
+
"ai-attack-surface",
|
|
1585
|
+
"ai-risk-management",
|
|
1586
|
+
"cloud-security",
|
|
1587
|
+
"container-runtime-security",
|
|
1588
|
+
"coordinated-vuln-disclosure",
|
|
1589
|
+
"rag-pipeline-security",
|
|
1590
|
+
"supply-chain-integrity"
|
|
1591
|
+
]
|
|
1592
|
+
},
|
|
1593
|
+
"incident-response-playbook": {
|
|
1594
|
+
"description": "Incident response playbook design for mid-2026 — NIST 800-61r3, ISO 27035, ATT&CK-driven detection, PICERL phases, AI-class incident handling (prompt injection breach, model exfiltration, AI-API C2), cross-jurisdiction breach notification timing",
|
|
1595
|
+
"threat_context_excerpt": "The incident-response landscape in mid-2026 is materially different from the regime the legacy guides describe.",
|
|
1596
|
+
"produces": "The skill produces seven artifacts per IR program assessment or live incident.\n\n### 1. Incident Classification Record\n\n```\nIncident ID: INC-<YYYY>-<NNNN>\nAwareness timestamp: <ISO timestamp — the regulator-clock anchor>\nDeclared severity: <Sev1/2/3>\nIncident commander: <named>\nClassification:\n ATT&CK techniques: <T-IDs with sub-techniques>\n ATLAS techniques: <AML.T-IDs, if applicable>\n Incident class: <ransomware/exfiltration/identity/supply-chain/AI-system/BEC/DoS/insider/other>\n Sector flag: <healthcare/financial/energy/federal/none>\n AI-class flag: <victim/vector/attacker/none>\n Cross ...",
|
|
1597
|
+
"key_xrefs": {
|
|
1598
|
+
"cwe_refs": [],
|
|
1599
|
+
"d3fend_refs": [],
|
|
1600
|
+
"framework_gaps": [
|
|
1601
|
+
"NIST-800-53-AC-2",
|
|
1602
|
+
"ISO-27001-2022-A.8.16",
|
|
1603
|
+
"SOC2-CC7-anomaly-detection"
|
|
1604
|
+
],
|
|
1605
|
+
"atlas_refs": [
|
|
1606
|
+
"AML.T0096",
|
|
1607
|
+
"AML.T0017",
|
|
1608
|
+
"AML.T0051"
|
|
1609
|
+
],
|
|
1610
|
+
"attack_refs": [
|
|
1611
|
+
"T1486",
|
|
1612
|
+
"T1041",
|
|
1613
|
+
"T1567",
|
|
1614
|
+
"T1078"
|
|
1615
|
+
],
|
|
1616
|
+
"rfc_refs": [],
|
|
1617
|
+
"dlp_refs": []
|
|
1618
|
+
},
|
|
1619
|
+
"trigger_count": 13,
|
|
1620
|
+
"atlas_count": 3,
|
|
1621
|
+
"attack_count": 4,
|
|
1622
|
+
"framework_gap_count": 3,
|
|
1623
|
+
"cwe_count": 0,
|
|
1624
|
+
"d3fend_count": 0,
|
|
1625
|
+
"rfc_count": 0,
|
|
1626
|
+
"last_threat_review": "2026-05-11",
|
|
1627
|
+
"path": "skills/incident-response-playbook/skill.md",
|
|
1628
|
+
"handoff_targets": [
|
|
1629
|
+
"ai-attack-surface",
|
|
1630
|
+
"ai-c2-detection",
|
|
1631
|
+
"compliance-theater",
|
|
1632
|
+
"coordinated-vuln-disclosure",
|
|
1633
|
+
"defensive-countermeasure-mapping",
|
|
1634
|
+
"dlp-gap-analysis",
|
|
1635
|
+
"framework-gap-analysis",
|
|
1636
|
+
"global-grc",
|
|
1637
|
+
"mcp-agent-trust",
|
|
1638
|
+
"rag-pipeline-security",
|
|
1639
|
+
"sector-energy",
|
|
1640
|
+
"sector-federal-government",
|
|
1641
|
+
"sector-financial",
|
|
1642
|
+
"sector-healthcare",
|
|
1643
|
+
"skill-update-loop",
|
|
1644
|
+
"threat-model-currency",
|
|
1645
|
+
"zeroday-gap-learn"
|
|
1646
|
+
]
|
|
1647
|
+
},
|
|
1648
|
+
"email-security-anti-phishing": {
|
|
1649
|
+
"description": "Email security + anti-phishing for mid-2026 — SPF/DKIM/DMARC/BIMI/ARC/MTA-STS/TLSRPT, AI-augmented phishing (vishing, deepfake video, hyperpersonalized email), Business Email Compromise, secure email gateways",
|
|
1650
|
+
"threat_context_excerpt": "Phishing remained the #1 initial-access vector through 2025 (Verizon DBIR 2025) and into 2026. The structural shift between 2024 and 2026 is **AI-augmentation of the phishing kill-chain** — content generation, voice synthesis, and live deepfake video have all collapsed from \"demonstrated in research\" to \"deployed against treasury, IT-helpdesk, and executive offices.\"",
|
|
1651
|
+
"produces": "The skill produces a structured assessment with these sections:\n\n1. **DMARC enforcement scorecard** — table of all owned domains × `{SPF, DKIM, DMARC policy, sp=, pct=, RUA destination, BIMI, ARC verification, MTA-STS, TLSRPT}`; aggregate score = (# domains at `p=reject` with `pct=100`) / (total sending domains).\n2. **Email-auth coverage matrix** — per-protocol deployment status (SPF / DKIM / DMARC / BIMI / ARC / MTA-STS / TLSRPT) with gap flags.\n3. **Passkey rollout percentage** — overall and per-role-class (executive, finance, IT-admin, helpdesk, general workforce), with target = 100% for pr ...",
|
|
1652
|
+
"key_xrefs": {
|
|
1653
|
+
"cwe_refs": [],
|
|
1654
|
+
"d3fend_refs": [],
|
|
1655
|
+
"framework_gaps": [
|
|
1656
|
+
"NIST-800-53-SI-3",
|
|
1657
|
+
"ISO-27001-2022-A.8.16",
|
|
1658
|
+
"SOC2-CC7-anomaly-detection"
|
|
1659
|
+
],
|
|
1660
|
+
"atlas_refs": [],
|
|
1661
|
+
"attack_refs": [
|
|
1662
|
+
"T1566",
|
|
1663
|
+
"T1566.001",
|
|
1664
|
+
"T1566.002",
|
|
1665
|
+
"T1566.003",
|
|
1666
|
+
"T1078"
|
|
1667
|
+
],
|
|
1668
|
+
"rfc_refs": [],
|
|
1669
|
+
"dlp_refs": []
|
|
1670
|
+
},
|
|
1671
|
+
"trigger_count": 17,
|
|
1672
|
+
"atlas_count": 0,
|
|
1673
|
+
"attack_count": 5,
|
|
1674
|
+
"framework_gap_count": 3,
|
|
1675
|
+
"cwe_count": 0,
|
|
1676
|
+
"d3fend_count": 0,
|
|
1677
|
+
"rfc_count": 0,
|
|
1678
|
+
"last_threat_review": "2026-05-11",
|
|
1679
|
+
"path": "skills/email-security-anti-phishing/skill.md",
|
|
1680
|
+
"handoff_targets": [
|
|
1681
|
+
"ai-attack-surface",
|
|
1682
|
+
"compliance-theater",
|
|
1683
|
+
"dlp-gap-analysis",
|
|
1684
|
+
"identity-assurance",
|
|
1685
|
+
"incident-response-playbook",
|
|
1686
|
+
"sector-financial"
|
|
1687
|
+
]
|
|
1688
|
+
},
|
|
1689
|
+
"age-gates-child-safety": {
|
|
1690
|
+
"description": "Age-related gates and child online safety for mid-2026 — COPPA + CIPA + California AADC + GDPR Art. 8 + DSA Art. 28 + UK Online Safety Act + UK Children's Code + AU Online Safety Act + IN DPDPA child provisions + KOSA pending; age verification standards (IEEE 2089-2021, OpenID Connect age claims); AI product age policies",
|
|
1691
|
+
"threat_context_excerpt": "The age-related regulatory wave that began with the UK Children's Code (in force Sept 2021) and California AADC (signed Sept 2022) crested in 2023-2025 and is in active enforcement entering mid-2026. The compliance surface for any consumer-facing product reachable by users under 18 is now approximately twenty-five overlapping jurisdictional regimes plus emerging AI-specific obligations, with enforcement asymmetry that punishes \"we don't track children\" as ignorance, not exemption.",
|
|
1692
|
+
"produces": "Produce this structure verbatim:\n\n```\n## Age Gates and Child-Safeguarding Posture Assessment\n\n**Assessment Date:** YYYY-MM-DD\n**Entity:** [operator name]\n**Scope:** [products / services in scope; cohorts served; jurisdictions]\n**Regulatory jurisdictions:** [US COPPA + CIPA + AADC + state laws + KOSA-if-enacted; EU GDPR Art. 8 + DSA Art. 28 + AVMSD + CSAM-Regulation-pending; UK OSA + Children's Code; AU OSA + under-16; IN DPDPA; BR LGPD; CN Minors Protection Law + PIPL Art. 31; SG OSA; JP youth protection; KR PIPA; QC Law 25]\n\n### Likely-Accessed-By-Children Inventory (Step 1)\n| Product / Servi ...",
|
|
1693
|
+
"key_xrefs": {
|
|
1694
|
+
"cwe_refs": [
|
|
1695
|
+
"CWE-200",
|
|
1696
|
+
"CWE-287",
|
|
1697
|
+
"CWE-862"
|
|
1698
|
+
],
|
|
1699
|
+
"d3fend_refs": [],
|
|
1700
|
+
"framework_gaps": [
|
|
1701
|
+
"ISO-27001-2022-A.8.30",
|
|
1702
|
+
"NIST-800-53-AC-2",
|
|
1703
|
+
"SOC2-CC6-logical-access"
|
|
1704
|
+
],
|
|
1705
|
+
"atlas_refs": [],
|
|
1706
|
+
"attack_refs": [
|
|
1707
|
+
"T1078",
|
|
1708
|
+
"T1567"
|
|
1709
|
+
],
|
|
1710
|
+
"rfc_refs": [],
|
|
1711
|
+
"dlp_refs": []
|
|
1712
|
+
},
|
|
1713
|
+
"trigger_count": 19,
|
|
1714
|
+
"atlas_count": 0,
|
|
1715
|
+
"attack_count": 2,
|
|
1716
|
+
"framework_gap_count": 3,
|
|
1717
|
+
"cwe_count": 3,
|
|
1718
|
+
"d3fend_count": 0,
|
|
1719
|
+
"rfc_count": 0,
|
|
1720
|
+
"last_threat_review": "2026-05-11",
|
|
1721
|
+
"path": "skills/age-gates-child-safety/skill.md",
|
|
1722
|
+
"handoff_targets": [
|
|
1723
|
+
"ai-attack-surface",
|
|
1724
|
+
"ai-risk-management",
|
|
1725
|
+
"compliance-theater",
|
|
1726
|
+
"coordinated-vuln-disclosure",
|
|
1727
|
+
"dlp-gap-analysis",
|
|
1728
|
+
"framework-gap-analysis",
|
|
1729
|
+
"global-grc",
|
|
1730
|
+
"identity-assurance",
|
|
1731
|
+
"incident-response-playbook",
|
|
1732
|
+
"sector-healthcare"
|
|
1733
|
+
]
|
|
1734
|
+
}
|
|
1735
|
+
}
|
|
1736
|
+
}
|