@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
|
@@ -0,0 +1,1374 @@
|
|
|
1
|
+
{
|
|
2
|
+
"kernel lpe": [
|
|
3
|
+
"kernel-lpe-triage"
|
|
4
|
+
],
|
|
5
|
+
"privilege escalation": [
|
|
6
|
+
"kernel-lpe-triage"
|
|
7
|
+
],
|
|
8
|
+
"copy fail": [
|
|
9
|
+
"kernel-lpe-triage"
|
|
10
|
+
],
|
|
11
|
+
"dirty frag": [
|
|
12
|
+
"kernel-lpe-triage"
|
|
13
|
+
],
|
|
14
|
+
"cve-2026-31431": [
|
|
15
|
+
"kernel-lpe-triage"
|
|
16
|
+
],
|
|
17
|
+
"cve-2026-43284": [
|
|
18
|
+
"kernel-lpe-triage"
|
|
19
|
+
],
|
|
20
|
+
"linux root": [
|
|
21
|
+
"kernel-lpe-triage"
|
|
22
|
+
],
|
|
23
|
+
"kernel patch": [
|
|
24
|
+
"kernel-lpe-triage"
|
|
25
|
+
],
|
|
26
|
+
"live kernel patch": [
|
|
27
|
+
"kernel-lpe-triage"
|
|
28
|
+
],
|
|
29
|
+
"ai attack surface": [
|
|
30
|
+
"ai-attack-surface"
|
|
31
|
+
],
|
|
32
|
+
"prompt injection": [
|
|
33
|
+
"ai-attack-surface"
|
|
34
|
+
],
|
|
35
|
+
"llm security": [
|
|
36
|
+
"ai-attack-surface"
|
|
37
|
+
],
|
|
38
|
+
"ai security assessment": [
|
|
39
|
+
"ai-attack-surface"
|
|
40
|
+
],
|
|
41
|
+
"model security": [
|
|
42
|
+
"ai-attack-surface"
|
|
43
|
+
],
|
|
44
|
+
"ai threat model": [
|
|
45
|
+
"ai-attack-surface"
|
|
46
|
+
],
|
|
47
|
+
"ai red team": [
|
|
48
|
+
"ai-attack-surface"
|
|
49
|
+
],
|
|
50
|
+
"promptsteal": [
|
|
51
|
+
"ai-attack-surface",
|
|
52
|
+
"ai-c2-detection"
|
|
53
|
+
],
|
|
54
|
+
"promptflux": [
|
|
55
|
+
"ai-attack-surface",
|
|
56
|
+
"ai-c2-detection"
|
|
57
|
+
],
|
|
58
|
+
"mcp security": [
|
|
59
|
+
"mcp-agent-trust"
|
|
60
|
+
],
|
|
61
|
+
"model context protocol": [
|
|
62
|
+
"mcp-agent-trust"
|
|
63
|
+
],
|
|
64
|
+
"agent trust": [
|
|
65
|
+
"mcp-agent-trust"
|
|
66
|
+
],
|
|
67
|
+
"tool trust": [
|
|
68
|
+
"mcp-agent-trust"
|
|
69
|
+
],
|
|
70
|
+
"mcp rce": [
|
|
71
|
+
"mcp-agent-trust"
|
|
72
|
+
],
|
|
73
|
+
"cve-2026-30615": [
|
|
74
|
+
"mcp-agent-trust"
|
|
75
|
+
],
|
|
76
|
+
"cursor security": [
|
|
77
|
+
"mcp-agent-trust"
|
|
78
|
+
],
|
|
79
|
+
"windsurf security": [
|
|
80
|
+
"mcp-agent-trust"
|
|
81
|
+
],
|
|
82
|
+
"claude code security": [
|
|
83
|
+
"mcp-agent-trust"
|
|
84
|
+
],
|
|
85
|
+
"ai agent security": [
|
|
86
|
+
"mcp-agent-trust"
|
|
87
|
+
],
|
|
88
|
+
"framework gap": [
|
|
89
|
+
"framework-gap-analysis"
|
|
90
|
+
],
|
|
91
|
+
"control gap": [
|
|
92
|
+
"framework-gap-analysis"
|
|
93
|
+
],
|
|
94
|
+
"nist gap": [
|
|
95
|
+
"framework-gap-analysis"
|
|
96
|
+
],
|
|
97
|
+
"iso 27001 gap": [
|
|
98
|
+
"framework-gap-analysis"
|
|
99
|
+
],
|
|
100
|
+
"soc 2 gap": [
|
|
101
|
+
"framework-gap-analysis"
|
|
102
|
+
],
|
|
103
|
+
"pci gap": [
|
|
104
|
+
"framework-gap-analysis"
|
|
105
|
+
],
|
|
106
|
+
"nis2 gap": [
|
|
107
|
+
"framework-gap-analysis"
|
|
108
|
+
],
|
|
109
|
+
"compliance gap": [
|
|
110
|
+
"compliance-theater",
|
|
111
|
+
"framework-gap-analysis"
|
|
112
|
+
],
|
|
113
|
+
"why doesn't this control cover": [
|
|
114
|
+
"framework-gap-analysis"
|
|
115
|
+
],
|
|
116
|
+
"compliance theater": [
|
|
117
|
+
"compliance-theater"
|
|
118
|
+
],
|
|
119
|
+
"paper compliance": [
|
|
120
|
+
"compliance-theater"
|
|
121
|
+
],
|
|
122
|
+
"audit but exposed": [
|
|
123
|
+
"compliance-theater"
|
|
124
|
+
],
|
|
125
|
+
"compliant but vulnerable": [
|
|
126
|
+
"compliance-theater"
|
|
127
|
+
],
|
|
128
|
+
"checkbox security": [
|
|
129
|
+
"compliance-theater"
|
|
130
|
+
],
|
|
131
|
+
"audit theater": [
|
|
132
|
+
"compliance-theater"
|
|
133
|
+
],
|
|
134
|
+
"exploit scoring": [
|
|
135
|
+
"exploit-scoring"
|
|
136
|
+
],
|
|
137
|
+
"rwep": [
|
|
138
|
+
"exploit-scoring"
|
|
139
|
+
],
|
|
140
|
+
"real world priority": [
|
|
141
|
+
"exploit-scoring"
|
|
142
|
+
],
|
|
143
|
+
"how bad is this cve": [
|
|
144
|
+
"exploit-scoring"
|
|
145
|
+
],
|
|
146
|
+
"prioritize cve": [
|
|
147
|
+
"exploit-scoring"
|
|
148
|
+
],
|
|
149
|
+
"cve priority": [
|
|
150
|
+
"exploit-scoring"
|
|
151
|
+
],
|
|
152
|
+
"patch priority": [
|
|
153
|
+
"exploit-scoring"
|
|
154
|
+
],
|
|
155
|
+
"beyond cvss": [
|
|
156
|
+
"exploit-scoring"
|
|
157
|
+
],
|
|
158
|
+
"rag security": [
|
|
159
|
+
"rag-pipeline-security"
|
|
160
|
+
],
|
|
161
|
+
"retrieval security": [
|
|
162
|
+
"rag-pipeline-security"
|
|
163
|
+
],
|
|
164
|
+
"vector store security": [
|
|
165
|
+
"rag-pipeline-security"
|
|
166
|
+
],
|
|
167
|
+
"embedding attack": [
|
|
168
|
+
"rag-pipeline-security"
|
|
169
|
+
],
|
|
170
|
+
"rag threat model": [
|
|
171
|
+
"rag-pipeline-security"
|
|
172
|
+
],
|
|
173
|
+
"knowledge base security": [
|
|
174
|
+
"rag-pipeline-security"
|
|
175
|
+
],
|
|
176
|
+
"vector poisoning": [
|
|
177
|
+
"rag-pipeline-security"
|
|
178
|
+
],
|
|
179
|
+
"ai c2": [
|
|
180
|
+
"ai-c2-detection"
|
|
181
|
+
],
|
|
182
|
+
"ai command and control": [
|
|
183
|
+
"ai-c2-detection"
|
|
184
|
+
],
|
|
185
|
+
"sesameop": [
|
|
186
|
+
"ai-c2-detection"
|
|
187
|
+
],
|
|
188
|
+
"ai api abuse": [
|
|
189
|
+
"ai-c2-detection"
|
|
190
|
+
],
|
|
191
|
+
"llm c2": [
|
|
192
|
+
"ai-c2-detection"
|
|
193
|
+
],
|
|
194
|
+
"covert channel ai": [
|
|
195
|
+
"ai-c2-detection"
|
|
196
|
+
],
|
|
197
|
+
"aml.t0096": [
|
|
198
|
+
"ai-c2-detection"
|
|
199
|
+
],
|
|
200
|
+
"policy exception": [
|
|
201
|
+
"policy-exception-gen"
|
|
202
|
+
],
|
|
203
|
+
"exception request": [
|
|
204
|
+
"policy-exception-gen"
|
|
205
|
+
],
|
|
206
|
+
"control exception": [
|
|
207
|
+
"policy-exception-gen"
|
|
208
|
+
],
|
|
209
|
+
"ephemeral exception": [
|
|
210
|
+
"policy-exception-gen"
|
|
211
|
+
],
|
|
212
|
+
"serverless exception": [
|
|
213
|
+
"policy-exception-gen"
|
|
214
|
+
],
|
|
215
|
+
"ai pipeline exception": [
|
|
216
|
+
"policy-exception-gen"
|
|
217
|
+
],
|
|
218
|
+
"zero trust exception": [
|
|
219
|
+
"policy-exception-gen"
|
|
220
|
+
],
|
|
221
|
+
"compensating control": [
|
|
222
|
+
"policy-exception-gen"
|
|
223
|
+
],
|
|
224
|
+
"threat model currency": [
|
|
225
|
+
"threat-model-currency"
|
|
226
|
+
],
|
|
227
|
+
"update threat model": [
|
|
228
|
+
"threat-model-currency"
|
|
229
|
+
],
|
|
230
|
+
"threat model review": [
|
|
231
|
+
"threat-model-currency"
|
|
232
|
+
],
|
|
233
|
+
"is our threat model current": [
|
|
234
|
+
"threat-model-currency"
|
|
235
|
+
],
|
|
236
|
+
"threat model gap": [
|
|
237
|
+
"threat-model-currency"
|
|
238
|
+
],
|
|
239
|
+
"threat intelligence gap": [
|
|
240
|
+
"threat-model-currency"
|
|
241
|
+
],
|
|
242
|
+
"global grc": [
|
|
243
|
+
"global-grc"
|
|
244
|
+
],
|
|
245
|
+
"international compliance": [
|
|
246
|
+
"global-grc"
|
|
247
|
+
],
|
|
248
|
+
"gdpr security": [
|
|
249
|
+
"global-grc"
|
|
250
|
+
],
|
|
251
|
+
"nis2": [
|
|
252
|
+
"global-grc"
|
|
253
|
+
],
|
|
254
|
+
"dora compliance": [
|
|
255
|
+
"global-grc"
|
|
256
|
+
],
|
|
257
|
+
"eu ai act": [
|
|
258
|
+
"global-grc"
|
|
259
|
+
],
|
|
260
|
+
"cyber resilience act": [
|
|
261
|
+
"global-grc"
|
|
262
|
+
],
|
|
263
|
+
"mas trm": [
|
|
264
|
+
"global-grc",
|
|
265
|
+
"sector-financial"
|
|
266
|
+
],
|
|
267
|
+
"cert-in": [
|
|
268
|
+
"global-grc"
|
|
269
|
+
],
|
|
270
|
+
"essential 8": [
|
|
271
|
+
"global-grc"
|
|
272
|
+
],
|
|
273
|
+
"apra cps 234": [
|
|
274
|
+
"global-grc",
|
|
275
|
+
"sector-financial"
|
|
276
|
+
],
|
|
277
|
+
"multi-jurisdiction": [
|
|
278
|
+
"global-grc"
|
|
279
|
+
],
|
|
280
|
+
"global compliance": [
|
|
281
|
+
"global-grc"
|
|
282
|
+
],
|
|
283
|
+
"zero day lesson": [
|
|
284
|
+
"zeroday-gap-learn"
|
|
285
|
+
],
|
|
286
|
+
"zeroday gap": [
|
|
287
|
+
"zeroday-gap-learn"
|
|
288
|
+
],
|
|
289
|
+
"what control gap enabled this": [
|
|
290
|
+
"zeroday-gap-learn"
|
|
291
|
+
],
|
|
292
|
+
"learn from exploit": [
|
|
293
|
+
"zeroday-gap-learn"
|
|
294
|
+
],
|
|
295
|
+
"exploit to control gap": [
|
|
296
|
+
"zeroday-gap-learn"
|
|
297
|
+
],
|
|
298
|
+
"what should have caught this": [
|
|
299
|
+
"zeroday-gap-learn"
|
|
300
|
+
],
|
|
301
|
+
"0day learning": [
|
|
302
|
+
"zeroday-gap-learn"
|
|
303
|
+
],
|
|
304
|
+
"pqc": [
|
|
305
|
+
"pqc-first"
|
|
306
|
+
],
|
|
307
|
+
"post-quantum": [
|
|
308
|
+
"pqc-first"
|
|
309
|
+
],
|
|
310
|
+
"quantum cryptography": [
|
|
311
|
+
"pqc-first"
|
|
312
|
+
],
|
|
313
|
+
"quantum safe": [
|
|
314
|
+
"pqc-first"
|
|
315
|
+
],
|
|
316
|
+
"ml-kem": [
|
|
317
|
+
"pqc-first"
|
|
318
|
+
],
|
|
319
|
+
"ml-dsa": [
|
|
320
|
+
"pqc-first"
|
|
321
|
+
],
|
|
322
|
+
"slh-dsa": [
|
|
323
|
+
"pqc-first"
|
|
324
|
+
],
|
|
325
|
+
"harvest now decrypt later": [
|
|
326
|
+
"pqc-first"
|
|
327
|
+
],
|
|
328
|
+
"quantum migration": [
|
|
329
|
+
"pqc-first"
|
|
330
|
+
],
|
|
331
|
+
"crypto migration": [
|
|
332
|
+
"pqc-first"
|
|
333
|
+
],
|
|
334
|
+
"openssl pqc": [
|
|
335
|
+
"pqc-first"
|
|
336
|
+
],
|
|
337
|
+
"fips 203": [
|
|
338
|
+
"pqc-first"
|
|
339
|
+
],
|
|
340
|
+
"fips 204": [
|
|
341
|
+
"pqc-first"
|
|
342
|
+
],
|
|
343
|
+
"fips 205": [
|
|
344
|
+
"pqc-first"
|
|
345
|
+
],
|
|
346
|
+
"update skills": [
|
|
347
|
+
"skill-update-loop"
|
|
348
|
+
],
|
|
349
|
+
"skill review": [
|
|
350
|
+
"skill-update-loop"
|
|
351
|
+
],
|
|
352
|
+
"check skill currency": [
|
|
353
|
+
"skill-update-loop"
|
|
354
|
+
],
|
|
355
|
+
"forward watch": [
|
|
356
|
+
"skill-update-loop"
|
|
357
|
+
],
|
|
358
|
+
"are skills current": [
|
|
359
|
+
"skill-update-loop"
|
|
360
|
+
],
|
|
361
|
+
"update threat intel": [
|
|
362
|
+
"skill-update-loop"
|
|
363
|
+
],
|
|
364
|
+
"skill maintenance": [
|
|
365
|
+
"skill-update-loop"
|
|
366
|
+
],
|
|
367
|
+
"new cve update": [
|
|
368
|
+
"skill-update-loop"
|
|
369
|
+
],
|
|
370
|
+
"atlas update": [
|
|
371
|
+
"skill-update-loop"
|
|
372
|
+
],
|
|
373
|
+
"framework update": [
|
|
374
|
+
"skill-update-loop"
|
|
375
|
+
],
|
|
376
|
+
"security maturity": [
|
|
377
|
+
"security-maturity-tiers"
|
|
378
|
+
],
|
|
379
|
+
"implementation roadmap": [
|
|
380
|
+
"security-maturity-tiers"
|
|
381
|
+
],
|
|
382
|
+
"what should we do first": [
|
|
383
|
+
"security-maturity-tiers"
|
|
384
|
+
],
|
|
385
|
+
"security tiers": [
|
|
386
|
+
"security-maturity-tiers"
|
|
387
|
+
],
|
|
388
|
+
"mvp security": [
|
|
389
|
+
"security-maturity-tiers"
|
|
390
|
+
],
|
|
391
|
+
"where to start": [
|
|
392
|
+
"security-maturity-tiers"
|
|
393
|
+
],
|
|
394
|
+
"security roadmap": [
|
|
395
|
+
"security-maturity-tiers"
|
|
396
|
+
],
|
|
397
|
+
"minimum viable security": [
|
|
398
|
+
"security-maturity-tiers"
|
|
399
|
+
],
|
|
400
|
+
"what's practical": [
|
|
401
|
+
"security-maturity-tiers"
|
|
402
|
+
],
|
|
403
|
+
"security best practices": [
|
|
404
|
+
"security-maturity-tiers"
|
|
405
|
+
],
|
|
406
|
+
"defense in depth": [
|
|
407
|
+
"defensive-countermeasure-mapping",
|
|
408
|
+
"security-maturity-tiers"
|
|
409
|
+
],
|
|
410
|
+
"how do we get from here to there": [
|
|
411
|
+
"security-maturity-tiers"
|
|
412
|
+
],
|
|
413
|
+
"research this cve": [
|
|
414
|
+
"researcher"
|
|
415
|
+
],
|
|
416
|
+
"what should i do about": [
|
|
417
|
+
"researcher"
|
|
418
|
+
],
|
|
419
|
+
"new threat": [
|
|
420
|
+
"researcher"
|
|
421
|
+
],
|
|
422
|
+
"new advisory": [
|
|
423
|
+
"researcher"
|
|
424
|
+
],
|
|
425
|
+
"new exploit": [
|
|
426
|
+
"researcher"
|
|
427
|
+
],
|
|
428
|
+
"triage threat": [
|
|
429
|
+
"researcher"
|
|
430
|
+
],
|
|
431
|
+
"where do i start": [
|
|
432
|
+
"researcher"
|
|
433
|
+
],
|
|
434
|
+
"which skill should i use": [
|
|
435
|
+
"researcher"
|
|
436
|
+
],
|
|
437
|
+
"threat intel triage": [
|
|
438
|
+
"researcher"
|
|
439
|
+
],
|
|
440
|
+
"exceptd research": [
|
|
441
|
+
"researcher"
|
|
442
|
+
],
|
|
443
|
+
"attack surface": [
|
|
444
|
+
"attack-surface-pentest"
|
|
445
|
+
],
|
|
446
|
+
"pen test": [
|
|
447
|
+
"attack-surface-pentest"
|
|
448
|
+
],
|
|
449
|
+
"penetration testing": [
|
|
450
|
+
"attack-surface-pentest"
|
|
451
|
+
],
|
|
452
|
+
"red team": [
|
|
453
|
+
"attack-surface-pentest"
|
|
454
|
+
],
|
|
455
|
+
"adversary emulation": [
|
|
456
|
+
"attack-surface-pentest"
|
|
457
|
+
],
|
|
458
|
+
"threat-led testing": [
|
|
459
|
+
"attack-surface-pentest"
|
|
460
|
+
],
|
|
461
|
+
"tlpt": [
|
|
462
|
+
"attack-surface-pentest",
|
|
463
|
+
"sector-financial"
|
|
464
|
+
],
|
|
465
|
+
"tiber-eu": [
|
|
466
|
+
"attack-surface-pentest",
|
|
467
|
+
"sector-financial"
|
|
468
|
+
],
|
|
469
|
+
"asset inventory": [
|
|
470
|
+
"attack-surface-pentest"
|
|
471
|
+
],
|
|
472
|
+
"external footprint": [
|
|
473
|
+
"attack-surface-pentest"
|
|
474
|
+
],
|
|
475
|
+
"asm": [
|
|
476
|
+
"attack-surface-pentest"
|
|
477
|
+
],
|
|
478
|
+
"fuzz testing": [
|
|
479
|
+
"fuzz-testing-strategy"
|
|
480
|
+
],
|
|
481
|
+
"fuzzing": [
|
|
482
|
+
"fuzz-testing-strategy"
|
|
483
|
+
],
|
|
484
|
+
"oss-fuzz": [
|
|
485
|
+
"fuzz-testing-strategy"
|
|
486
|
+
],
|
|
487
|
+
"syzkaller": [
|
|
488
|
+
"fuzz-testing-strategy"
|
|
489
|
+
],
|
|
490
|
+
"libfuzzer": [
|
|
491
|
+
"fuzz-testing-strategy"
|
|
492
|
+
],
|
|
493
|
+
"afl": [
|
|
494
|
+
"fuzz-testing-strategy"
|
|
495
|
+
],
|
|
496
|
+
"coverage-guided fuzz": [
|
|
497
|
+
"fuzz-testing-strategy"
|
|
498
|
+
],
|
|
499
|
+
"ai-assisted fuzz": [
|
|
500
|
+
"fuzz-testing-strategy"
|
|
501
|
+
],
|
|
502
|
+
"continuous fuzz": [
|
|
503
|
+
"fuzz-testing-strategy"
|
|
504
|
+
],
|
|
505
|
+
"prompt fuzz": [
|
|
506
|
+
"fuzz-testing-strategy"
|
|
507
|
+
],
|
|
508
|
+
"api fuzz": [
|
|
509
|
+
"fuzz-testing-strategy"
|
|
510
|
+
],
|
|
511
|
+
"dlp": [
|
|
512
|
+
"dlp-gap-analysis"
|
|
513
|
+
],
|
|
514
|
+
"data loss prevention": [
|
|
515
|
+
"dlp-gap-analysis"
|
|
516
|
+
],
|
|
517
|
+
"data leak": [
|
|
518
|
+
"dlp-gap-analysis"
|
|
519
|
+
],
|
|
520
|
+
"egress": [
|
|
521
|
+
"dlp-gap-analysis"
|
|
522
|
+
],
|
|
523
|
+
"exfiltration": [
|
|
524
|
+
"dlp-gap-analysis"
|
|
525
|
+
],
|
|
526
|
+
"data classification": [
|
|
527
|
+
"dlp-gap-analysis"
|
|
528
|
+
],
|
|
529
|
+
"llm dlp": [
|
|
530
|
+
"dlp-gap-analysis"
|
|
531
|
+
],
|
|
532
|
+
"prompt dlp": [
|
|
533
|
+
"dlp-gap-analysis"
|
|
534
|
+
],
|
|
535
|
+
"rag exfil": [
|
|
536
|
+
"dlp-gap-analysis"
|
|
537
|
+
],
|
|
538
|
+
"copilot data leak": [
|
|
539
|
+
"dlp-gap-analysis"
|
|
540
|
+
],
|
|
541
|
+
"data exfiltration": [
|
|
542
|
+
"dlp-gap-analysis"
|
|
543
|
+
],
|
|
544
|
+
"mcp tool arg dlp": [
|
|
545
|
+
"dlp-gap-analysis"
|
|
546
|
+
],
|
|
547
|
+
"embedding store exfil": [
|
|
548
|
+
"dlp-gap-analysis"
|
|
549
|
+
],
|
|
550
|
+
"clipboard ai paste": [
|
|
551
|
+
"dlp-gap-analysis"
|
|
552
|
+
],
|
|
553
|
+
"supply chain": [
|
|
554
|
+
"supply-chain-integrity"
|
|
555
|
+
],
|
|
556
|
+
"slsa": [
|
|
557
|
+
"supply-chain-integrity"
|
|
558
|
+
],
|
|
559
|
+
"sbom": [
|
|
560
|
+
"supply-chain-integrity"
|
|
561
|
+
],
|
|
562
|
+
"vex": [
|
|
563
|
+
"supply-chain-integrity"
|
|
564
|
+
],
|
|
565
|
+
"sigstore": [
|
|
566
|
+
"supply-chain-integrity"
|
|
567
|
+
],
|
|
568
|
+
"cosign": [
|
|
569
|
+
"supply-chain-integrity"
|
|
570
|
+
],
|
|
571
|
+
"in-toto": [
|
|
572
|
+
"supply-chain-integrity"
|
|
573
|
+
],
|
|
574
|
+
"cyclonedx": [
|
|
575
|
+
"supply-chain-integrity"
|
|
576
|
+
],
|
|
577
|
+
"spdx": [
|
|
578
|
+
"supply-chain-integrity"
|
|
579
|
+
],
|
|
580
|
+
"software composition": [
|
|
581
|
+
"supply-chain-integrity"
|
|
582
|
+
],
|
|
583
|
+
"model provenance": [
|
|
584
|
+
"supply-chain-integrity"
|
|
585
|
+
],
|
|
586
|
+
"ai bom": [
|
|
587
|
+
"supply-chain-integrity"
|
|
588
|
+
],
|
|
589
|
+
"aibom": [
|
|
590
|
+
"supply-chain-integrity"
|
|
591
|
+
],
|
|
592
|
+
"csaf": [
|
|
593
|
+
"coordinated-vuln-disclosure",
|
|
594
|
+
"supply-chain-integrity"
|
|
595
|
+
],
|
|
596
|
+
"defensive mapping": [
|
|
597
|
+
"defensive-countermeasure-mapping"
|
|
598
|
+
],
|
|
599
|
+
"d3fend": [
|
|
600
|
+
"defensive-countermeasure-mapping"
|
|
601
|
+
],
|
|
602
|
+
"countermeasure": [
|
|
603
|
+
"defensive-countermeasure-mapping"
|
|
604
|
+
],
|
|
605
|
+
"blue team": [
|
|
606
|
+
"defensive-countermeasure-mapping",
|
|
607
|
+
"incident-response-playbook"
|
|
608
|
+
],
|
|
609
|
+
"least privilege": [
|
|
610
|
+
"defensive-countermeasure-mapping"
|
|
611
|
+
],
|
|
612
|
+
"zero trust": [
|
|
613
|
+
"defensive-countermeasure-mapping"
|
|
614
|
+
],
|
|
615
|
+
"control mapping": [
|
|
616
|
+
"defensive-countermeasure-mapping"
|
|
617
|
+
],
|
|
618
|
+
"mitigation": [
|
|
619
|
+
"defensive-countermeasure-mapping"
|
|
620
|
+
],
|
|
621
|
+
"defensive coverage": [
|
|
622
|
+
"defensive-countermeasure-mapping"
|
|
623
|
+
],
|
|
624
|
+
"blue team map": [
|
|
625
|
+
"defensive-countermeasure-mapping"
|
|
626
|
+
],
|
|
627
|
+
"identity assurance": [
|
|
628
|
+
"identity-assurance"
|
|
629
|
+
],
|
|
630
|
+
"aal": [
|
|
631
|
+
"identity-assurance"
|
|
632
|
+
],
|
|
633
|
+
"ial": [
|
|
634
|
+
"identity-assurance"
|
|
635
|
+
],
|
|
636
|
+
"fal": [
|
|
637
|
+
"identity-assurance"
|
|
638
|
+
],
|
|
639
|
+
"nist 800-63": [
|
|
640
|
+
"identity-assurance"
|
|
641
|
+
],
|
|
642
|
+
"fido2": [
|
|
643
|
+
"identity-assurance"
|
|
644
|
+
],
|
|
645
|
+
"webauthn": [
|
|
646
|
+
"identity-assurance"
|
|
647
|
+
],
|
|
648
|
+
"passkey": [
|
|
649
|
+
"identity-assurance"
|
|
650
|
+
],
|
|
651
|
+
"oidc": [
|
|
652
|
+
"identity-assurance"
|
|
653
|
+
],
|
|
654
|
+
"saml": [
|
|
655
|
+
"identity-assurance"
|
|
656
|
+
],
|
|
657
|
+
"scim": [
|
|
658
|
+
"identity-assurance"
|
|
659
|
+
],
|
|
660
|
+
"agent identity": [
|
|
661
|
+
"identity-assurance"
|
|
662
|
+
],
|
|
663
|
+
"workload identity": [
|
|
664
|
+
"cloud-security",
|
|
665
|
+
"identity-assurance"
|
|
666
|
+
],
|
|
667
|
+
"service account": [
|
|
668
|
+
"identity-assurance"
|
|
669
|
+
],
|
|
670
|
+
"federation": [
|
|
671
|
+
"identity-assurance"
|
|
672
|
+
],
|
|
673
|
+
"phishing-resistant": [
|
|
674
|
+
"identity-assurance"
|
|
675
|
+
],
|
|
676
|
+
"ot security": [
|
|
677
|
+
"ot-ics-security"
|
|
678
|
+
],
|
|
679
|
+
"ics security": [
|
|
680
|
+
"ot-ics-security"
|
|
681
|
+
],
|
|
682
|
+
"scada": [
|
|
683
|
+
"ot-ics-security"
|
|
684
|
+
],
|
|
685
|
+
"plc security": [
|
|
686
|
+
"ot-ics-security"
|
|
687
|
+
],
|
|
688
|
+
"operational technology": [
|
|
689
|
+
"ot-ics-security"
|
|
690
|
+
],
|
|
691
|
+
"industrial control": [
|
|
692
|
+
"ot-ics-security"
|
|
693
|
+
],
|
|
694
|
+
"iec 62443": [
|
|
695
|
+
"ot-ics-security"
|
|
696
|
+
],
|
|
697
|
+
"nist 800-82": [
|
|
698
|
+
"ot-ics-security"
|
|
699
|
+
],
|
|
700
|
+
"nerc cip": [
|
|
701
|
+
"ot-ics-security",
|
|
702
|
+
"sector-energy"
|
|
703
|
+
],
|
|
704
|
+
"it ot convergence": [
|
|
705
|
+
"ot-ics-security"
|
|
706
|
+
],
|
|
707
|
+
"hmi security": [
|
|
708
|
+
"ot-ics-security"
|
|
709
|
+
],
|
|
710
|
+
"air gap": [
|
|
711
|
+
"ot-ics-security"
|
|
712
|
+
],
|
|
713
|
+
"level 0": [
|
|
714
|
+
"ot-ics-security"
|
|
715
|
+
],
|
|
716
|
+
"level 1": [
|
|
717
|
+
"ot-ics-security"
|
|
718
|
+
],
|
|
719
|
+
"purdue": [
|
|
720
|
+
"ot-ics-security"
|
|
721
|
+
],
|
|
722
|
+
"cvd": [
|
|
723
|
+
"coordinated-vuln-disclosure"
|
|
724
|
+
],
|
|
725
|
+
"coordinated vulnerability disclosure": [
|
|
726
|
+
"coordinated-vuln-disclosure"
|
|
727
|
+
],
|
|
728
|
+
"vdp": [
|
|
729
|
+
"coordinated-vuln-disclosure"
|
|
730
|
+
],
|
|
731
|
+
"vulnerability disclosure program": [
|
|
732
|
+
"coordinated-vuln-disclosure"
|
|
733
|
+
],
|
|
734
|
+
"bug bounty": [
|
|
735
|
+
"coordinated-vuln-disclosure"
|
|
736
|
+
],
|
|
737
|
+
"responsible disclosure": [
|
|
738
|
+
"coordinated-vuln-disclosure"
|
|
739
|
+
],
|
|
740
|
+
"iso 29147": [
|
|
741
|
+
"coordinated-vuln-disclosure"
|
|
742
|
+
],
|
|
743
|
+
"iso 30111": [
|
|
744
|
+
"coordinated-vuln-disclosure"
|
|
745
|
+
],
|
|
746
|
+
"security.txt": [
|
|
747
|
+
"coordinated-vuln-disclosure"
|
|
748
|
+
],
|
|
749
|
+
"90-day disclosure": [
|
|
750
|
+
"coordinated-vuln-disclosure"
|
|
751
|
+
],
|
|
752
|
+
"project zero": [
|
|
753
|
+
"coordinated-vuln-disclosure"
|
|
754
|
+
],
|
|
755
|
+
"threat model": [
|
|
756
|
+
"threat-modeling-methodology"
|
|
757
|
+
],
|
|
758
|
+
"threat modeling": [
|
|
759
|
+
"threat-modeling-methodology"
|
|
760
|
+
],
|
|
761
|
+
"stride": [
|
|
762
|
+
"threat-modeling-methodology"
|
|
763
|
+
],
|
|
764
|
+
"pasta": [
|
|
765
|
+
"threat-modeling-methodology"
|
|
766
|
+
],
|
|
767
|
+
"linddun": [
|
|
768
|
+
"threat-modeling-methodology"
|
|
769
|
+
],
|
|
770
|
+
"kill chain": [
|
|
771
|
+
"threat-modeling-methodology"
|
|
772
|
+
],
|
|
773
|
+
"diamond model": [
|
|
774
|
+
"threat-modeling-methodology"
|
|
775
|
+
],
|
|
776
|
+
"unified kill chain": [
|
|
777
|
+
"threat-modeling-methodology"
|
|
778
|
+
],
|
|
779
|
+
"attack tree": [
|
|
780
|
+
"threat-modeling-methodology"
|
|
781
|
+
],
|
|
782
|
+
"threat modeling methodology": [
|
|
783
|
+
"threat-modeling-methodology"
|
|
784
|
+
],
|
|
785
|
+
"data flow diagram": [
|
|
786
|
+
"threat-modeling-methodology"
|
|
787
|
+
],
|
|
788
|
+
"dfd": [
|
|
789
|
+
"threat-modeling-methodology"
|
|
790
|
+
],
|
|
791
|
+
"trust boundary": [
|
|
792
|
+
"threat-modeling-methodology"
|
|
793
|
+
],
|
|
794
|
+
"webapp security": [
|
|
795
|
+
"webapp-security"
|
|
796
|
+
],
|
|
797
|
+
"web application security": [
|
|
798
|
+
"webapp-security"
|
|
799
|
+
],
|
|
800
|
+
"owasp top 10": [
|
|
801
|
+
"webapp-security"
|
|
802
|
+
],
|
|
803
|
+
"owasp asvs": [
|
|
804
|
+
"webapp-security"
|
|
805
|
+
],
|
|
806
|
+
"xss": [
|
|
807
|
+
"webapp-security"
|
|
808
|
+
],
|
|
809
|
+
"csrf": [
|
|
810
|
+
"webapp-security"
|
|
811
|
+
],
|
|
812
|
+
"sqli": [
|
|
813
|
+
"webapp-security"
|
|
814
|
+
],
|
|
815
|
+
"sql injection": [
|
|
816
|
+
"webapp-security"
|
|
817
|
+
],
|
|
818
|
+
"path traversal": [
|
|
819
|
+
"webapp-security"
|
|
820
|
+
],
|
|
821
|
+
"ssrf": [
|
|
822
|
+
"webapp-security"
|
|
823
|
+
],
|
|
824
|
+
"file upload": [
|
|
825
|
+
"webapp-security"
|
|
826
|
+
],
|
|
827
|
+
"command injection": [
|
|
828
|
+
"webapp-security"
|
|
829
|
+
],
|
|
830
|
+
"unsafe deserialization": [
|
|
831
|
+
"webapp-security"
|
|
832
|
+
],
|
|
833
|
+
"broken access control": [
|
|
834
|
+
"webapp-security"
|
|
835
|
+
],
|
|
836
|
+
"ai generated code": [
|
|
837
|
+
"webapp-security"
|
|
838
|
+
],
|
|
839
|
+
"ai risk management": [
|
|
840
|
+
"ai-risk-management"
|
|
841
|
+
],
|
|
842
|
+
"ai governance": [
|
|
843
|
+
"ai-risk-management"
|
|
844
|
+
],
|
|
845
|
+
"ai impact assessment": [
|
|
846
|
+
"ai-risk-management"
|
|
847
|
+
],
|
|
848
|
+
"aia": [
|
|
849
|
+
"ai-risk-management"
|
|
850
|
+
],
|
|
851
|
+
"dpia ai": [
|
|
852
|
+
"ai-risk-management"
|
|
853
|
+
],
|
|
854
|
+
"iso 23894": [
|
|
855
|
+
"ai-risk-management"
|
|
856
|
+
],
|
|
857
|
+
"iso 42001": [
|
|
858
|
+
"ai-risk-management"
|
|
859
|
+
],
|
|
860
|
+
"nist ai rmf": [
|
|
861
|
+
"ai-risk-management"
|
|
862
|
+
],
|
|
863
|
+
"ai red team program": [
|
|
864
|
+
"ai-risk-management"
|
|
865
|
+
],
|
|
866
|
+
"ai incident response": [
|
|
867
|
+
"ai-risk-management"
|
|
868
|
+
],
|
|
869
|
+
"eu ai act high-risk": [
|
|
870
|
+
"ai-risk-management"
|
|
871
|
+
],
|
|
872
|
+
"ai vendor risk": [
|
|
873
|
+
"ai-risk-management"
|
|
874
|
+
],
|
|
875
|
+
"ai management system": [
|
|
876
|
+
"ai-risk-management"
|
|
877
|
+
],
|
|
878
|
+
"healthcare security": [
|
|
879
|
+
"sector-healthcare"
|
|
880
|
+
],
|
|
881
|
+
"hipaa": [
|
|
882
|
+
"sector-healthcare"
|
|
883
|
+
],
|
|
884
|
+
"hitrust": [
|
|
885
|
+
"sector-healthcare"
|
|
886
|
+
],
|
|
887
|
+
"hl7": [
|
|
888
|
+
"sector-healthcare"
|
|
889
|
+
],
|
|
890
|
+
"fhir": [
|
|
891
|
+
"sector-healthcare"
|
|
892
|
+
],
|
|
893
|
+
"phi": [
|
|
894
|
+
"sector-healthcare"
|
|
895
|
+
],
|
|
896
|
+
"protected health information": [
|
|
897
|
+
"sector-healthcare"
|
|
898
|
+
],
|
|
899
|
+
"medical device security": [
|
|
900
|
+
"sector-healthcare"
|
|
901
|
+
],
|
|
902
|
+
"samd": [
|
|
903
|
+
"sector-healthcare"
|
|
904
|
+
],
|
|
905
|
+
"fda cyber": [
|
|
906
|
+
"sector-healthcare"
|
|
907
|
+
],
|
|
908
|
+
"eu mdr": [
|
|
909
|
+
"sector-healthcare"
|
|
910
|
+
],
|
|
911
|
+
"clinical decision support": [
|
|
912
|
+
"sector-healthcare"
|
|
913
|
+
],
|
|
914
|
+
"ai diagnostic": [
|
|
915
|
+
"sector-healthcare"
|
|
916
|
+
],
|
|
917
|
+
"patient data": [
|
|
918
|
+
"sector-healthcare"
|
|
919
|
+
],
|
|
920
|
+
"financial security": [
|
|
921
|
+
"sector-financial"
|
|
922
|
+
],
|
|
923
|
+
"banking security": [
|
|
924
|
+
"sector-financial"
|
|
925
|
+
],
|
|
926
|
+
"dora": [
|
|
927
|
+
"sector-financial"
|
|
928
|
+
],
|
|
929
|
+
"psd2": [
|
|
930
|
+
"sector-financial"
|
|
931
|
+
],
|
|
932
|
+
"psd3": [
|
|
933
|
+
"sector-financial"
|
|
934
|
+
],
|
|
935
|
+
"sca": [
|
|
936
|
+
"sector-financial"
|
|
937
|
+
],
|
|
938
|
+
"strong customer authentication": [
|
|
939
|
+
"sector-financial"
|
|
940
|
+
],
|
|
941
|
+
"swift cscf": [
|
|
942
|
+
"sector-financial"
|
|
943
|
+
],
|
|
944
|
+
"nydfs": [
|
|
945
|
+
"sector-financial"
|
|
946
|
+
],
|
|
947
|
+
"23 nycrr 500": [
|
|
948
|
+
"sector-financial"
|
|
949
|
+
],
|
|
950
|
+
"ffiec": [
|
|
951
|
+
"sector-financial"
|
|
952
|
+
],
|
|
953
|
+
"cbest": [
|
|
954
|
+
"sector-financial"
|
|
955
|
+
],
|
|
956
|
+
"icast": [
|
|
957
|
+
"sector-financial"
|
|
958
|
+
],
|
|
959
|
+
"federal cyber": [
|
|
960
|
+
"sector-federal-government"
|
|
961
|
+
],
|
|
962
|
+
"government cybersecurity": [
|
|
963
|
+
"sector-federal-government"
|
|
964
|
+
],
|
|
965
|
+
"fedramp": [
|
|
966
|
+
"sector-federal-government"
|
|
967
|
+
],
|
|
968
|
+
"cmmc": [
|
|
969
|
+
"sector-federal-government"
|
|
970
|
+
],
|
|
971
|
+
"eo 14028": [
|
|
972
|
+
"sector-federal-government"
|
|
973
|
+
],
|
|
974
|
+
"nist 800-171": [
|
|
975
|
+
"sector-federal-government"
|
|
976
|
+
],
|
|
977
|
+
"nist 800-172": [
|
|
978
|
+
"sector-federal-government"
|
|
979
|
+
],
|
|
980
|
+
"cui": [
|
|
981
|
+
"sector-federal-government"
|
|
982
|
+
],
|
|
983
|
+
"fisma": [
|
|
984
|
+
"sector-federal-government"
|
|
985
|
+
],
|
|
986
|
+
"federal zero trust": [
|
|
987
|
+
"sector-federal-government"
|
|
988
|
+
],
|
|
989
|
+
"m-22-09": [
|
|
990
|
+
"sector-federal-government"
|
|
991
|
+
],
|
|
992
|
+
"omb m-24-04": [
|
|
993
|
+
"sector-federal-government"
|
|
994
|
+
],
|
|
995
|
+
"jab authorization": [
|
|
996
|
+
"sector-federal-government"
|
|
997
|
+
],
|
|
998
|
+
"cisa bod": [
|
|
999
|
+
"sector-federal-government"
|
|
1000
|
+
],
|
|
1001
|
+
"cisa ed": [
|
|
1002
|
+
"sector-federal-government"
|
|
1003
|
+
],
|
|
1004
|
+
"stateramp": [
|
|
1005
|
+
"sector-federal-government"
|
|
1006
|
+
],
|
|
1007
|
+
"energy security": [
|
|
1008
|
+
"sector-energy"
|
|
1009
|
+
],
|
|
1010
|
+
"electric grid security": [
|
|
1011
|
+
"sector-energy"
|
|
1012
|
+
],
|
|
1013
|
+
"oil gas cyber": [
|
|
1014
|
+
"sector-energy"
|
|
1015
|
+
],
|
|
1016
|
+
"pipeline cyber": [
|
|
1017
|
+
"sector-energy"
|
|
1018
|
+
],
|
|
1019
|
+
"water utility cyber": [
|
|
1020
|
+
"sector-energy"
|
|
1021
|
+
],
|
|
1022
|
+
"tsa sd-2021": [
|
|
1023
|
+
"sector-energy"
|
|
1024
|
+
],
|
|
1025
|
+
"awwa cyber": [
|
|
1026
|
+
"sector-energy"
|
|
1027
|
+
],
|
|
1028
|
+
"aescsf": [
|
|
1029
|
+
"sector-energy"
|
|
1030
|
+
],
|
|
1031
|
+
"nccs-g": [
|
|
1032
|
+
"sector-energy"
|
|
1033
|
+
],
|
|
1034
|
+
"grid resilience": [
|
|
1035
|
+
"sector-energy"
|
|
1036
|
+
],
|
|
1037
|
+
"renewable cyber": [
|
|
1038
|
+
"sector-energy"
|
|
1039
|
+
],
|
|
1040
|
+
"inverter security": [
|
|
1041
|
+
"sector-energy"
|
|
1042
|
+
],
|
|
1043
|
+
"der security": [
|
|
1044
|
+
"sector-energy"
|
|
1045
|
+
],
|
|
1046
|
+
"smart meter security": [
|
|
1047
|
+
"sector-energy"
|
|
1048
|
+
],
|
|
1049
|
+
"api security": [
|
|
1050
|
+
"api-security"
|
|
1051
|
+
],
|
|
1052
|
+
"owasp api top 10": [
|
|
1053
|
+
"api-security"
|
|
1054
|
+
],
|
|
1055
|
+
"bola": [
|
|
1056
|
+
"api-security"
|
|
1057
|
+
],
|
|
1058
|
+
"bfla": [
|
|
1059
|
+
"api-security"
|
|
1060
|
+
],
|
|
1061
|
+
"mass assignment": [
|
|
1062
|
+
"api-security"
|
|
1063
|
+
],
|
|
1064
|
+
"api gateway": [
|
|
1065
|
+
"api-security"
|
|
1066
|
+
],
|
|
1067
|
+
"rate limiting": [
|
|
1068
|
+
"api-security"
|
|
1069
|
+
],
|
|
1070
|
+
"graphql security": [
|
|
1071
|
+
"api-security"
|
|
1072
|
+
],
|
|
1073
|
+
"grpc security": [
|
|
1074
|
+
"api-security"
|
|
1075
|
+
],
|
|
1076
|
+
"rest security": [
|
|
1077
|
+
"api-security"
|
|
1078
|
+
],
|
|
1079
|
+
"websocket security": [
|
|
1080
|
+
"api-security"
|
|
1081
|
+
],
|
|
1082
|
+
"ai api security": [
|
|
1083
|
+
"api-security"
|
|
1084
|
+
],
|
|
1085
|
+
"mcp transport": [
|
|
1086
|
+
"api-security"
|
|
1087
|
+
],
|
|
1088
|
+
"openapi security": [
|
|
1089
|
+
"api-security"
|
|
1090
|
+
],
|
|
1091
|
+
"cloud security": [
|
|
1092
|
+
"cloud-security"
|
|
1093
|
+
],
|
|
1094
|
+
"cspm": [
|
|
1095
|
+
"cloud-security"
|
|
1096
|
+
],
|
|
1097
|
+
"cwpp": [
|
|
1098
|
+
"cloud-security"
|
|
1099
|
+
],
|
|
1100
|
+
"cnapp": [
|
|
1101
|
+
"cloud-security"
|
|
1102
|
+
],
|
|
1103
|
+
"csa ccm": [
|
|
1104
|
+
"cloud-security"
|
|
1105
|
+
],
|
|
1106
|
+
"aws security": [
|
|
1107
|
+
"cloud-security"
|
|
1108
|
+
],
|
|
1109
|
+
"azure security": [
|
|
1110
|
+
"cloud-security"
|
|
1111
|
+
],
|
|
1112
|
+
"gcp security": [
|
|
1113
|
+
"cloud-security"
|
|
1114
|
+
],
|
|
1115
|
+
"cloud iam": [
|
|
1116
|
+
"cloud-security"
|
|
1117
|
+
],
|
|
1118
|
+
"irsa": [
|
|
1119
|
+
"cloud-security"
|
|
1120
|
+
],
|
|
1121
|
+
"cloud runtime": [
|
|
1122
|
+
"cloud-security"
|
|
1123
|
+
],
|
|
1124
|
+
"shared responsibility": [
|
|
1125
|
+
"cloud-security"
|
|
1126
|
+
],
|
|
1127
|
+
"multi cloud": [
|
|
1128
|
+
"cloud-security"
|
|
1129
|
+
],
|
|
1130
|
+
"falco": [
|
|
1131
|
+
"cloud-security",
|
|
1132
|
+
"container-runtime-security"
|
|
1133
|
+
],
|
|
1134
|
+
"container security": [
|
|
1135
|
+
"container-runtime-security"
|
|
1136
|
+
],
|
|
1137
|
+
"kubernetes security": [
|
|
1138
|
+
"container-runtime-security"
|
|
1139
|
+
],
|
|
1140
|
+
"k8s security": [
|
|
1141
|
+
"container-runtime-security"
|
|
1142
|
+
],
|
|
1143
|
+
"cis kubernetes": [
|
|
1144
|
+
"container-runtime-security"
|
|
1145
|
+
],
|
|
1146
|
+
"nsa hardening": [
|
|
1147
|
+
"container-runtime-security"
|
|
1148
|
+
],
|
|
1149
|
+
"pod security standards": [
|
|
1150
|
+
"container-runtime-security"
|
|
1151
|
+
],
|
|
1152
|
+
"kyverno": [
|
|
1153
|
+
"container-runtime-security"
|
|
1154
|
+
],
|
|
1155
|
+
"gatekeeper": [
|
|
1156
|
+
"container-runtime-security"
|
|
1157
|
+
],
|
|
1158
|
+
"opa": [
|
|
1159
|
+
"container-runtime-security"
|
|
1160
|
+
],
|
|
1161
|
+
"tetragon": [
|
|
1162
|
+
"container-runtime-security"
|
|
1163
|
+
],
|
|
1164
|
+
"sigstore policy": [
|
|
1165
|
+
"container-runtime-security"
|
|
1166
|
+
],
|
|
1167
|
+
"admission controller": [
|
|
1168
|
+
"container-runtime-security"
|
|
1169
|
+
],
|
|
1170
|
+
"networkpolicy": [
|
|
1171
|
+
"container-runtime-security"
|
|
1172
|
+
],
|
|
1173
|
+
"cilium": [
|
|
1174
|
+
"container-runtime-security"
|
|
1175
|
+
],
|
|
1176
|
+
"kserve": [
|
|
1177
|
+
"container-runtime-security"
|
|
1178
|
+
],
|
|
1179
|
+
"vllm": [
|
|
1180
|
+
"container-runtime-security"
|
|
1181
|
+
],
|
|
1182
|
+
"mlops security": [
|
|
1183
|
+
"mlops-security"
|
|
1184
|
+
],
|
|
1185
|
+
"ml pipeline security": [
|
|
1186
|
+
"mlops-security"
|
|
1187
|
+
],
|
|
1188
|
+
"model registry security": [
|
|
1189
|
+
"mlops-security"
|
|
1190
|
+
],
|
|
1191
|
+
"training data integrity": [
|
|
1192
|
+
"mlops-security"
|
|
1193
|
+
],
|
|
1194
|
+
"mlflow": [
|
|
1195
|
+
"mlops-security"
|
|
1196
|
+
],
|
|
1197
|
+
"kubeflow": [
|
|
1198
|
+
"mlops-security"
|
|
1199
|
+
],
|
|
1200
|
+
"vertex ai": [
|
|
1201
|
+
"mlops-security"
|
|
1202
|
+
],
|
|
1203
|
+
"sagemaker": [
|
|
1204
|
+
"mlops-security"
|
|
1205
|
+
],
|
|
1206
|
+
"azure ml": [
|
|
1207
|
+
"mlops-security"
|
|
1208
|
+
],
|
|
1209
|
+
"hugging face": [
|
|
1210
|
+
"mlops-security"
|
|
1211
|
+
],
|
|
1212
|
+
"model signing": [
|
|
1213
|
+
"mlops-security"
|
|
1214
|
+
],
|
|
1215
|
+
"model card": [
|
|
1216
|
+
"mlops-security"
|
|
1217
|
+
],
|
|
1218
|
+
"data card": [
|
|
1219
|
+
"mlops-security"
|
|
1220
|
+
],
|
|
1221
|
+
"feature store": [
|
|
1222
|
+
"mlops-security"
|
|
1223
|
+
],
|
|
1224
|
+
"drift detection": [
|
|
1225
|
+
"mlops-security"
|
|
1226
|
+
],
|
|
1227
|
+
"model monitoring": [
|
|
1228
|
+
"mlops-security"
|
|
1229
|
+
],
|
|
1230
|
+
"incident response": [
|
|
1231
|
+
"incident-response-playbook"
|
|
1232
|
+
],
|
|
1233
|
+
"ir playbook": [
|
|
1234
|
+
"incident-response-playbook"
|
|
1235
|
+
],
|
|
1236
|
+
"csirt": [
|
|
1237
|
+
"incident-response-playbook"
|
|
1238
|
+
],
|
|
1239
|
+
"picerl": [
|
|
1240
|
+
"incident-response-playbook"
|
|
1241
|
+
],
|
|
1242
|
+
"nist 800-61": [
|
|
1243
|
+
"incident-response-playbook"
|
|
1244
|
+
],
|
|
1245
|
+
"iso 27035": [
|
|
1246
|
+
"incident-response-playbook"
|
|
1247
|
+
],
|
|
1248
|
+
"breach notification": [
|
|
1249
|
+
"incident-response-playbook"
|
|
1250
|
+
],
|
|
1251
|
+
"incident handler": [
|
|
1252
|
+
"incident-response-playbook"
|
|
1253
|
+
],
|
|
1254
|
+
"soc playbook": [
|
|
1255
|
+
"incident-response-playbook"
|
|
1256
|
+
],
|
|
1257
|
+
"ai incident": [
|
|
1258
|
+
"incident-response-playbook"
|
|
1259
|
+
],
|
|
1260
|
+
"prompt injection incident": [
|
|
1261
|
+
"incident-response-playbook"
|
|
1262
|
+
],
|
|
1263
|
+
"model exfiltration incident": [
|
|
1264
|
+
"incident-response-playbook"
|
|
1265
|
+
],
|
|
1266
|
+
"email security": [
|
|
1267
|
+
"email-security-anti-phishing"
|
|
1268
|
+
],
|
|
1269
|
+
"anti-phishing": [
|
|
1270
|
+
"email-security-anti-phishing"
|
|
1271
|
+
],
|
|
1272
|
+
"phishing": [
|
|
1273
|
+
"email-security-anti-phishing"
|
|
1274
|
+
],
|
|
1275
|
+
"spear phishing": [
|
|
1276
|
+
"email-security-anti-phishing"
|
|
1277
|
+
],
|
|
1278
|
+
"bec": [
|
|
1279
|
+
"email-security-anti-phishing"
|
|
1280
|
+
],
|
|
1281
|
+
"business email compromise": [
|
|
1282
|
+
"email-security-anti-phishing"
|
|
1283
|
+
],
|
|
1284
|
+
"dmarc": [
|
|
1285
|
+
"email-security-anti-phishing"
|
|
1286
|
+
],
|
|
1287
|
+
"dkim": [
|
|
1288
|
+
"email-security-anti-phishing"
|
|
1289
|
+
],
|
|
1290
|
+
"spf": [
|
|
1291
|
+
"email-security-anti-phishing"
|
|
1292
|
+
],
|
|
1293
|
+
"bimi": [
|
|
1294
|
+
"email-security-anti-phishing"
|
|
1295
|
+
],
|
|
1296
|
+
"arc": [
|
|
1297
|
+
"email-security-anti-phishing"
|
|
1298
|
+
],
|
|
1299
|
+
"mta-sts": [
|
|
1300
|
+
"email-security-anti-phishing"
|
|
1301
|
+
],
|
|
1302
|
+
"tlsrpt": [
|
|
1303
|
+
"email-security-anti-phishing"
|
|
1304
|
+
],
|
|
1305
|
+
"vishing": [
|
|
1306
|
+
"email-security-anti-phishing"
|
|
1307
|
+
],
|
|
1308
|
+
"deepfake phishing": [
|
|
1309
|
+
"email-security-anti-phishing"
|
|
1310
|
+
],
|
|
1311
|
+
"ai phishing": [
|
|
1312
|
+
"email-security-anti-phishing"
|
|
1313
|
+
],
|
|
1314
|
+
"secure email gateway": [
|
|
1315
|
+
"email-security-anti-phishing"
|
|
1316
|
+
],
|
|
1317
|
+
"age gate": [
|
|
1318
|
+
"age-gates-child-safety"
|
|
1319
|
+
],
|
|
1320
|
+
"age gates": [
|
|
1321
|
+
"age-gates-child-safety"
|
|
1322
|
+
],
|
|
1323
|
+
"age verification": [
|
|
1324
|
+
"age-gates-child-safety"
|
|
1325
|
+
],
|
|
1326
|
+
"age assurance": [
|
|
1327
|
+
"age-gates-child-safety"
|
|
1328
|
+
],
|
|
1329
|
+
"child online safety": [
|
|
1330
|
+
"age-gates-child-safety"
|
|
1331
|
+
],
|
|
1332
|
+
"coppa": [
|
|
1333
|
+
"age-gates-child-safety"
|
|
1334
|
+
],
|
|
1335
|
+
"cipa": [
|
|
1336
|
+
"age-gates-child-safety"
|
|
1337
|
+
],
|
|
1338
|
+
"california aadc": [
|
|
1339
|
+
"age-gates-child-safety"
|
|
1340
|
+
],
|
|
1341
|
+
"children's code": [
|
|
1342
|
+
"age-gates-child-safety"
|
|
1343
|
+
],
|
|
1344
|
+
"uk online safety act": [
|
|
1345
|
+
"age-gates-child-safety"
|
|
1346
|
+
],
|
|
1347
|
+
"kosa": [
|
|
1348
|
+
"age-gates-child-safety"
|
|
1349
|
+
],
|
|
1350
|
+
"gdpr article 8": [
|
|
1351
|
+
"age-gates-child-safety"
|
|
1352
|
+
],
|
|
1353
|
+
"dsa article 28": [
|
|
1354
|
+
"age-gates-child-safety"
|
|
1355
|
+
],
|
|
1356
|
+
"parental consent": [
|
|
1357
|
+
"age-gates-child-safety"
|
|
1358
|
+
],
|
|
1359
|
+
"csam": [
|
|
1360
|
+
"age-gates-child-safety"
|
|
1361
|
+
],
|
|
1362
|
+
"child safety": [
|
|
1363
|
+
"age-gates-child-safety"
|
|
1364
|
+
],
|
|
1365
|
+
"ofcom": [
|
|
1366
|
+
"age-gates-child-safety"
|
|
1367
|
+
],
|
|
1368
|
+
"esafety": [
|
|
1369
|
+
"age-gates-child-safety"
|
|
1370
|
+
],
|
|
1371
|
+
"children's online safety": [
|
|
1372
|
+
"age-gates-child-safety"
|
|
1373
|
+
]
|
|
1374
|
+
}
|