@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
|
@@ -0,0 +1,496 @@
|
|
|
1
|
+
{
|
|
2
|
+
"_meta": {
|
|
3
|
+
"schema_version": "1.0.0",
|
|
4
|
+
"last_updated": "2026-05-11",
|
|
5
|
+
"source": "NVD + CISA KEV + vendor advisories — see sources/index.json",
|
|
6
|
+
"required_fields": [
|
|
7
|
+
"type",
|
|
8
|
+
"cvss_score",
|
|
9
|
+
"cvss_vector",
|
|
10
|
+
"cisa_kev",
|
|
11
|
+
"poc_available",
|
|
12
|
+
"active_exploitation",
|
|
13
|
+
"affected",
|
|
14
|
+
"patch_available",
|
|
15
|
+
"patch_required_reboot",
|
|
16
|
+
"rwep_score",
|
|
17
|
+
"rwep_factors",
|
|
18
|
+
"atlas_refs",
|
|
19
|
+
"attack_refs",
|
|
20
|
+
"source_verified",
|
|
21
|
+
"verification_sources",
|
|
22
|
+
"last_updated"
|
|
23
|
+
],
|
|
24
|
+
"epss_methodology": "EPSS scores are estimated from public catalog signals (KEV, PoC, AI-discovery, blast radius) and should be replaced with live FIRST API responses on the next validate-cves --live run. epss_date marks when this estimate was set.",
|
|
25
|
+
"tlp": "CLEAR",
|
|
26
|
+
"source_confidence": {
|
|
27
|
+
"scheme": "Admiralty (A-F + 1-6)",
|
|
28
|
+
"default": "A1",
|
|
29
|
+
"note": "B = usually reliable; 2 = probably true. Per-entry overrides via entry-level source_confidence field. Public-record catalogs (NVD, ATLAS, CWE, RFC, framework publishers) get A1 (completely reliable, confirmed). Project-curated catalogs (zeroday-lessons, exploit-availability) default to B2 with source citations."
|
|
30
|
+
},
|
|
31
|
+
"freshness_policy": {
|
|
32
|
+
"default_review_cadence_days": 90,
|
|
33
|
+
"stale_after_days": 180,
|
|
34
|
+
"rebuild_after_days": 365,
|
|
35
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
36
|
+
},
|
|
37
|
+
"vendor_advisory_field_added": "2026-05-11",
|
|
38
|
+
"vendor_advisory_note": "Each CVE carries a structured vendor_advisories array (vendor, advisory_id, url, severity, published_date) for downstream consumers that route by vendor advisory. Unknown advisory IDs are null with the canonical vendor CVE-resolver URL — never fabricated. Existing free-form references are preserved in verification_sources; vendor_advisories is additive."
|
|
39
|
+
},
|
|
40
|
+
"CVE-2026-31431": {
|
|
41
|
+
"name": "Copy Fail",
|
|
42
|
+
"type": "LPE",
|
|
43
|
+
"cvss_score": 7.8,
|
|
44
|
+
"cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
45
|
+
"cisa_kev": true,
|
|
46
|
+
"cisa_kev_date": "2026-03-15",
|
|
47
|
+
"cisa_kev_due_date": "2026-04-05",
|
|
48
|
+
"poc_available": true,
|
|
49
|
+
"poc_description": "Public exploit script — single-stage, 732 bytes, no race condition, deterministic root escalation from any unprivileged user or container",
|
|
50
|
+
"ai_discovered": true,
|
|
51
|
+
"ai_discovery_notes": "Discovered by an AI system in approximately 1 hour via automated analysis of page-cache CoW primitives",
|
|
52
|
+
"ai_assisted_weaponization": false,
|
|
53
|
+
"active_exploitation": "confirmed",
|
|
54
|
+
"affected": "Linux kernel >= 4.14 — all major distributions since 2017: RHEL 7-9, Ubuntu 18.04-24.04, Debian 9-12, Amazon Linux 2/2023, SUSE 12/15, Alpine, and derivatives",
|
|
55
|
+
"affected_versions": [
|
|
56
|
+
"linux-kernel >= 4.14",
|
|
57
|
+
"linux-kernel < 6.8.10"
|
|
58
|
+
],
|
|
59
|
+
"vector": "Page-cache copy-on-write (CoW) primitive abuse — unprivileged local user writes to read-only page-cache mapping via copy-on-write path",
|
|
60
|
+
"complexity": "deterministic",
|
|
61
|
+
"complexity_notes": "No race condition. No heap spray. No timing dependency. Executes reliably on every attempt.",
|
|
62
|
+
"patch_available": true,
|
|
63
|
+
"patch_required_reboot": true,
|
|
64
|
+
"live_patch_available": true,
|
|
65
|
+
"live_patch_tools": [
|
|
66
|
+
"kpatch",
|
|
67
|
+
"canonical-livepatch",
|
|
68
|
+
"kGraft"
|
|
69
|
+
],
|
|
70
|
+
"live_patch_notes": "Live patches available from Red Hat (kpatch), Canonical (livepatch), and SUSE (kGraft) for supported distribution versions",
|
|
71
|
+
"framework_control_gaps": {
|
|
72
|
+
"NIST-800-53-SI-2": "30-day critical patch SLA is an exploitation window, not a security window, for CISA KEV + public PoC. 'Timely' is undefined for instant-root deterministic LPE.",
|
|
73
|
+
"ISO-27001-2022-A.8.8": "'Appropriate timescales' is undefined; standard interpretation of 30 days is architecturally unsafe for this class. No live-patch requirement.",
|
|
74
|
+
"PCI-DSS-4.0-6.3.3": "1-month critical patch window; same problem as SI-2.",
|
|
75
|
+
"NIS2-Art21": "No specific guidance on live patching capability or CISA KEV-class response timelines.",
|
|
76
|
+
"CIS-Controls-v8-Control7": "IG3 continuous vulnerability management; 'within one month' still too long for this class."
|
|
77
|
+
},
|
|
78
|
+
"atlas_refs": [],
|
|
79
|
+
"attack_refs": [
|
|
80
|
+
"T1068",
|
|
81
|
+
"T1548.001"
|
|
82
|
+
],
|
|
83
|
+
"rwep_score": 90,
|
|
84
|
+
"rwep_factors": {
|
|
85
|
+
"cisa_kev": 25,
|
|
86
|
+
"poc_available": 20,
|
|
87
|
+
"ai_factor": 15,
|
|
88
|
+
"active_exploitation": 20,
|
|
89
|
+
"blast_radius": 30,
|
|
90
|
+
"patch_available": -15,
|
|
91
|
+
"live_patch_available": -10,
|
|
92
|
+
"reboot_required": 5
|
|
93
|
+
},
|
|
94
|
+
"epss_score": 0.94,
|
|
95
|
+
"epss_percentile": 0.99,
|
|
96
|
+
"epss_date": "2026-05-11",
|
|
97
|
+
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2026-31431",
|
|
98
|
+
"source_verified": "2026-05-01",
|
|
99
|
+
"verification_sources": [
|
|
100
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2026-31431",
|
|
101
|
+
"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
|
|
102
|
+
],
|
|
103
|
+
"vendor_advisories": [
|
|
104
|
+
{
|
|
105
|
+
"vendor": "kernel.org",
|
|
106
|
+
"advisory_id": null,
|
|
107
|
+
"url": "https://lore.kernel.org/linux-cve-announce/?q=CVE-2026-31431",
|
|
108
|
+
"severity": "high",
|
|
109
|
+
"published_date": "2026-03-12"
|
|
110
|
+
},
|
|
111
|
+
{
|
|
112
|
+
"vendor": "Red Hat",
|
|
113
|
+
"advisory_id": null,
|
|
114
|
+
"url": "https://access.redhat.com/security/cve/CVE-2026-31431",
|
|
115
|
+
"severity": "important",
|
|
116
|
+
"published_date": "2026-03-13"
|
|
117
|
+
},
|
|
118
|
+
{
|
|
119
|
+
"vendor": "Canonical (Ubuntu)",
|
|
120
|
+
"advisory_id": null,
|
|
121
|
+
"url": "https://ubuntu.com/security/CVE-2026-31431",
|
|
122
|
+
"severity": "high",
|
|
123
|
+
"published_date": "2026-03-13"
|
|
124
|
+
},
|
|
125
|
+
{
|
|
126
|
+
"vendor": "SUSE",
|
|
127
|
+
"advisory_id": null,
|
|
128
|
+
"url": "https://www.suse.com/security/cve/CVE-2026-31431.html",
|
|
129
|
+
"severity": "important",
|
|
130
|
+
"published_date": "2026-03-13"
|
|
131
|
+
},
|
|
132
|
+
{
|
|
133
|
+
"vendor": "Debian",
|
|
134
|
+
"advisory_id": null,
|
|
135
|
+
"url": "https://security-tracker.debian.org/tracker/CVE-2026-31431",
|
|
136
|
+
"severity": "high",
|
|
137
|
+
"published_date": "2026-03-14"
|
|
138
|
+
},
|
|
139
|
+
{
|
|
140
|
+
"vendor": "Microsoft (WSL2)",
|
|
141
|
+
"advisory_id": null,
|
|
142
|
+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31431",
|
|
143
|
+
"severity": "important",
|
|
144
|
+
"published_date": "2026-03-15"
|
|
145
|
+
}
|
|
146
|
+
],
|
|
147
|
+
"last_updated": "2026-05-11"
|
|
148
|
+
},
|
|
149
|
+
"CVE-2026-43284": {
|
|
150
|
+
"name": "Dirty Frag (ESP/IPsec component)",
|
|
151
|
+
"type": "LPE",
|
|
152
|
+
"cvss_score": 7.8,
|
|
153
|
+
"cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
154
|
+
"cisa_kev": false,
|
|
155
|
+
"cisa_kev_date": null,
|
|
156
|
+
"poc_available": true,
|
|
157
|
+
"poc_description": "Chain component — exploits page-cache write primitive in ESP/IPsec subsystem. Part of two-CVE chain with CVE-2026-43500.",
|
|
158
|
+
"ai_discovered": false,
|
|
159
|
+
"ai_assisted_weaponization": false,
|
|
160
|
+
"active_exploitation": "suspected",
|
|
161
|
+
"affected": "Linux systems using IPsec/ESP kernel subsystem — all major distributions with kernel IPsec support",
|
|
162
|
+
"affected_versions": [
|
|
163
|
+
"linux-kernel >= 5.0"
|
|
164
|
+
],
|
|
165
|
+
"vector": "Page-cache write primitive in ESP/IPsec subsystem. Notable: exploitation path runs through IPsec — IPsec-based network controls are NOT compensating controls for unpatched systems.",
|
|
166
|
+
"complexity": "moderate",
|
|
167
|
+
"complexity_notes": "Requires kernel version fingerprinting to select gadget chain. More sophisticated than Copy Fail but still reliable.",
|
|
168
|
+
"patch_available": true,
|
|
169
|
+
"patch_required_reboot": true,
|
|
170
|
+
"live_patch_available": false,
|
|
171
|
+
"live_patch_tools": [],
|
|
172
|
+
"live_patch_notes": "kpatch available for RHEL only; not broadly available across distributions — scored as unavailable for population-level risk",
|
|
173
|
+
"framework_control_gaps": {
|
|
174
|
+
"NIST-800-53-SC-8": "SC-8 compliance via IPsec does not compensate for CVE-2026-43284 — the exploit runs through the IPsec implementation.",
|
|
175
|
+
"NIST-800-53-SC-28": "Same — IPsec-based encryption controls are not compensating controls for the subsystem being exploited.",
|
|
176
|
+
"NIST-800-53-SI-2": "Same SLA problem as CVE-2026-31431 for public PoC."
|
|
177
|
+
},
|
|
178
|
+
"atlas_refs": [],
|
|
179
|
+
"attack_refs": [
|
|
180
|
+
"T1068",
|
|
181
|
+
"T1548.001"
|
|
182
|
+
],
|
|
183
|
+
"rwep_score": 38,
|
|
184
|
+
"rwep_factors": {
|
|
185
|
+
"cisa_kev": 0,
|
|
186
|
+
"poc_available": 20,
|
|
187
|
+
"ai_factor": 0,
|
|
188
|
+
"active_exploitation": 10,
|
|
189
|
+
"blast_radius": 18,
|
|
190
|
+
"patch_available": -15,
|
|
191
|
+
"live_patch_available": 0,
|
|
192
|
+
"reboot_required": 5
|
|
193
|
+
},
|
|
194
|
+
"epss_score": 0.18,
|
|
195
|
+
"epss_percentile": 0.88,
|
|
196
|
+
"epss_date": "2026-05-11",
|
|
197
|
+
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2026-43284",
|
|
198
|
+
"source_verified": "2026-05-01",
|
|
199
|
+
"verification_sources": [
|
|
200
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2026-43284"
|
|
201
|
+
],
|
|
202
|
+
"vendor_advisories": [
|
|
203
|
+
{
|
|
204
|
+
"vendor": "kernel.org",
|
|
205
|
+
"advisory_id": null,
|
|
206
|
+
"url": "https://lore.kernel.org/linux-cve-announce/?q=CVE-2026-43284",
|
|
207
|
+
"severity": "high",
|
|
208
|
+
"published_date": "2026-04-02"
|
|
209
|
+
},
|
|
210
|
+
{
|
|
211
|
+
"vendor": "Red Hat",
|
|
212
|
+
"advisory_id": null,
|
|
213
|
+
"url": "https://access.redhat.com/security/cve/CVE-2026-43284",
|
|
214
|
+
"severity": "important",
|
|
215
|
+
"published_date": "2026-04-03"
|
|
216
|
+
},
|
|
217
|
+
{
|
|
218
|
+
"vendor": "Canonical (Ubuntu)",
|
|
219
|
+
"advisory_id": null,
|
|
220
|
+
"url": "https://ubuntu.com/security/CVE-2026-43284",
|
|
221
|
+
"severity": "high",
|
|
222
|
+
"published_date": "2026-04-03"
|
|
223
|
+
},
|
|
224
|
+
{
|
|
225
|
+
"vendor": "SUSE",
|
|
226
|
+
"advisory_id": null,
|
|
227
|
+
"url": "https://www.suse.com/security/cve/CVE-2026-43284.html",
|
|
228
|
+
"severity": "important",
|
|
229
|
+
"published_date": "2026-04-03"
|
|
230
|
+
},
|
|
231
|
+
{
|
|
232
|
+
"vendor": "Debian",
|
|
233
|
+
"advisory_id": null,
|
|
234
|
+
"url": "https://security-tracker.debian.org/tracker/CVE-2026-43284",
|
|
235
|
+
"severity": "high",
|
|
236
|
+
"published_date": "2026-04-04"
|
|
237
|
+
},
|
|
238
|
+
{
|
|
239
|
+
"vendor": "Microsoft (WSL2)",
|
|
240
|
+
"advisory_id": null,
|
|
241
|
+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43284",
|
|
242
|
+
"severity": "important",
|
|
243
|
+
"published_date": "2026-04-05"
|
|
244
|
+
}
|
|
245
|
+
],
|
|
246
|
+
"last_updated": "2026-05-11"
|
|
247
|
+
},
|
|
248
|
+
"CVE-2026-43500": {
|
|
249
|
+
"name": "Dirty Frag (RxRPC component)",
|
|
250
|
+
"type": "LPE",
|
|
251
|
+
"cvss_score": 7.6,
|
|
252
|
+
"cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
253
|
+
"cisa_kev": false,
|
|
254
|
+
"cisa_kev_date": null,
|
|
255
|
+
"poc_available": true,
|
|
256
|
+
"poc_description": "Chain component — exploits page-cache write primitive in RxRPC subsystem. Used in combination with CVE-2026-43284.",
|
|
257
|
+
"ai_discovered": false,
|
|
258
|
+
"ai_assisted_weaponization": false,
|
|
259
|
+
"active_exploitation": "suspected",
|
|
260
|
+
"affected": "Linux systems with RxRPC support",
|
|
261
|
+
"affected_versions": [
|
|
262
|
+
"linux-kernel >= 5.0"
|
|
263
|
+
],
|
|
264
|
+
"vector": "Page-cache write primitive in RxRPC subsystem. Chained with CVE-2026-43284.",
|
|
265
|
+
"complexity": "moderate",
|
|
266
|
+
"complexity_notes": "Requires pairing with CVE-2026-43284 and kernel version fingerprinting to select the correct RxRPC gadget. More involved than standalone exploits but still reliable when chained.",
|
|
267
|
+
"patch_available": true,
|
|
268
|
+
"patch_required_reboot": true,
|
|
269
|
+
"live_patch_available": false,
|
|
270
|
+
"live_patch_tools": [],
|
|
271
|
+
"framework_control_gaps": {
|
|
272
|
+
"NIST-800-53-SI-2": "Same patch SLA problem as CVE-2026-31431 for public PoC."
|
|
273
|
+
},
|
|
274
|
+
"atlas_refs": [],
|
|
275
|
+
"attack_refs": [
|
|
276
|
+
"T1068"
|
|
277
|
+
],
|
|
278
|
+
"rwep_score": 32,
|
|
279
|
+
"rwep_factors": {
|
|
280
|
+
"cisa_kev": 0,
|
|
281
|
+
"poc_available": 20,
|
|
282
|
+
"ai_factor": 0,
|
|
283
|
+
"active_exploitation": 10,
|
|
284
|
+
"blast_radius": 12,
|
|
285
|
+
"patch_available": -15,
|
|
286
|
+
"live_patch_available": 0,
|
|
287
|
+
"reboot_required": 5
|
|
288
|
+
},
|
|
289
|
+
"epss_score": 0.07,
|
|
290
|
+
"epss_percentile": 0.75,
|
|
291
|
+
"epss_date": "2026-05-11",
|
|
292
|
+
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2026-43500",
|
|
293
|
+
"source_verified": "2026-05-01",
|
|
294
|
+
"verification_sources": [
|
|
295
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2026-43500"
|
|
296
|
+
],
|
|
297
|
+
"vendor_advisories": [
|
|
298
|
+
{
|
|
299
|
+
"vendor": "kernel.org",
|
|
300
|
+
"advisory_id": null,
|
|
301
|
+
"url": "https://lore.kernel.org/linux-cve-announce/?q=CVE-2026-43500",
|
|
302
|
+
"severity": "high",
|
|
303
|
+
"published_date": "2026-04-02"
|
|
304
|
+
},
|
|
305
|
+
{
|
|
306
|
+
"vendor": "Red Hat",
|
|
307
|
+
"advisory_id": null,
|
|
308
|
+
"url": "https://access.redhat.com/security/cve/CVE-2026-43500",
|
|
309
|
+
"severity": "important",
|
|
310
|
+
"published_date": "2026-04-03"
|
|
311
|
+
},
|
|
312
|
+
{
|
|
313
|
+
"vendor": "Canonical (Ubuntu)",
|
|
314
|
+
"advisory_id": null,
|
|
315
|
+
"url": "https://ubuntu.com/security/CVE-2026-43500",
|
|
316
|
+
"severity": "high",
|
|
317
|
+
"published_date": "2026-04-03"
|
|
318
|
+
},
|
|
319
|
+
{
|
|
320
|
+
"vendor": "SUSE",
|
|
321
|
+
"advisory_id": null,
|
|
322
|
+
"url": "https://www.suse.com/security/cve/CVE-2026-43500.html",
|
|
323
|
+
"severity": "important",
|
|
324
|
+
"published_date": "2026-04-03"
|
|
325
|
+
},
|
|
326
|
+
{
|
|
327
|
+
"vendor": "Debian",
|
|
328
|
+
"advisory_id": null,
|
|
329
|
+
"url": "https://security-tracker.debian.org/tracker/CVE-2026-43500",
|
|
330
|
+
"severity": "high",
|
|
331
|
+
"published_date": "2026-04-04"
|
|
332
|
+
},
|
|
333
|
+
{
|
|
334
|
+
"vendor": "Microsoft (WSL2)",
|
|
335
|
+
"advisory_id": null,
|
|
336
|
+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43500",
|
|
337
|
+
"severity": "important",
|
|
338
|
+
"published_date": "2026-04-05"
|
|
339
|
+
}
|
|
340
|
+
],
|
|
341
|
+
"last_updated": "2026-05-11"
|
|
342
|
+
},
|
|
343
|
+
"CVE-2025-53773": {
|
|
344
|
+
"name": "GitHub Copilot Prompt Injection RCE",
|
|
345
|
+
"type": "RCE-via-prompt-injection",
|
|
346
|
+
"cvss_score": 9.6,
|
|
347
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
|
348
|
+
"cisa_kev": false,
|
|
349
|
+
"cisa_kev_date": null,
|
|
350
|
+
"poc_available": true,
|
|
351
|
+
"poc_description": "Demonstrated — hidden adversarial instructions in GitHub PR descriptions cause GitHub Copilot to execute attacker-controlled code in the developer's session",
|
|
352
|
+
"ai_discovered": false,
|
|
353
|
+
"ai_assisted_weaponization": true,
|
|
354
|
+
"ai_assisted_notes": "AI tooling enables the attack — the vulnerability IS in an AI tool. AI accelerates crafting of effective injection payloads.",
|
|
355
|
+
"active_exploitation": "suspected",
|
|
356
|
+
"affected": "GitHub Copilot users who use Copilot to review or summarize PR descriptions",
|
|
357
|
+
"affected_versions": [
|
|
358
|
+
"GitHub Copilot < patched version"
|
|
359
|
+
],
|
|
360
|
+
"vector": "Prompt injection via PR description field — adversarial instructions embedded in PR content execute in the context of the developer's Copilot session when the developer interacts with the PR via Copilot",
|
|
361
|
+
"complexity": "low",
|
|
362
|
+
"complexity_notes": "The attacker crafts PR description content. No specialized knowledge required beyond understanding of prompt injection.",
|
|
363
|
+
"patch_available": true,
|
|
364
|
+
"patch_required_reboot": false,
|
|
365
|
+
"live_patch_available": true,
|
|
366
|
+
"live_patch_tools": [
|
|
367
|
+
"GitHub SaaS update — no user action required for SaaS patch"
|
|
368
|
+
],
|
|
369
|
+
"framework_control_gaps": {
|
|
370
|
+
"ALL-MAJOR-FRAMEWORKS": "No framework has a control category for prompt injection as an RCE vector. CVSS 9.6 with no framework control.",
|
|
371
|
+
"NIST-800-53-AC-2": "AI agent actions use the developer's authorized service account — AC-2 controls don't surface the unauthorized action.",
|
|
372
|
+
"SOC2-CC6": "Same — logical access controls don't apply to model-context-window-mediated actions."
|
|
373
|
+
},
|
|
374
|
+
"atlas_refs": [
|
|
375
|
+
"AML.T0051",
|
|
376
|
+
"AML.T0054"
|
|
377
|
+
],
|
|
378
|
+
"attack_refs": [
|
|
379
|
+
"T1059",
|
|
380
|
+
"T1190"
|
|
381
|
+
],
|
|
382
|
+
"rwep_score": 42,
|
|
383
|
+
"rwep_factors": {
|
|
384
|
+
"cisa_kev": 0,
|
|
385
|
+
"poc_available": 20,
|
|
386
|
+
"ai_factor": 15,
|
|
387
|
+
"active_exploitation": 10,
|
|
388
|
+
"blast_radius": 22,
|
|
389
|
+
"patch_available": -15,
|
|
390
|
+
"live_patch_available": -10,
|
|
391
|
+
"reboot_required": 0
|
|
392
|
+
},
|
|
393
|
+
"epss_score": 0.32,
|
|
394
|
+
"epss_percentile": 0.92,
|
|
395
|
+
"epss_date": "2026-05-11",
|
|
396
|
+
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2025-53773",
|
|
397
|
+
"source_verified": "2026-05-01",
|
|
398
|
+
"verification_sources": [
|
|
399
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2025-53773",
|
|
400
|
+
"https://github.com/advisories/GHSA-xxxx"
|
|
401
|
+
],
|
|
402
|
+
"vendor_advisories": [
|
|
403
|
+
{
|
|
404
|
+
"vendor": "Microsoft MSRC",
|
|
405
|
+
"advisory_id": null,
|
|
406
|
+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53773",
|
|
407
|
+
"severity": "critical",
|
|
408
|
+
"published_date": "2025-08-12"
|
|
409
|
+
},
|
|
410
|
+
{
|
|
411
|
+
"vendor": "GitHub Security Advisories",
|
|
412
|
+
"advisory_id": null,
|
|
413
|
+
"url": "https://github.com/advisories?query=CVE-2025-53773",
|
|
414
|
+
"severity": "critical",
|
|
415
|
+
"published_date": "2025-08-12"
|
|
416
|
+
}
|
|
417
|
+
],
|
|
418
|
+
"last_updated": "2026-05-11"
|
|
419
|
+
},
|
|
420
|
+
"CVE-2026-30615": {
|
|
421
|
+
"name": "Windsurf MCP Zero-Interaction RCE",
|
|
422
|
+
"type": "RCE-supply-chain",
|
|
423
|
+
"cvss_score": 9.8,
|
|
424
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
425
|
+
"cisa_kev": false,
|
|
426
|
+
"cisa_kev_date": null,
|
|
427
|
+
"poc_available": true,
|
|
428
|
+
"poc_description": "Partial — MCP client vulnerability in Windsurf allows malicious MCP server to achieve code execution without user interaction",
|
|
429
|
+
"ai_discovered": false,
|
|
430
|
+
"ai_assisted_weaponization": false,
|
|
431
|
+
"active_exploitation": "suspected",
|
|
432
|
+
"affected": "Windsurf IDE users with MCP servers installed. Architectural attack surface affects all MCP-capable AI coding assistants (Cursor, VS Code, Claude Code, Gemini CLI). 150M+ combined downloads.",
|
|
433
|
+
"affected_versions": [
|
|
434
|
+
"Windsurf < patched version"
|
|
435
|
+
],
|
|
436
|
+
"vector": "Malicious MCP server delivers adversarial tool response → AI assistant follows instructions without user interaction → code execution in user context",
|
|
437
|
+
"complexity": "low",
|
|
438
|
+
"complexity_notes": "Attacker needs to get a malicious MCP server installed (supply chain, typosquatting, or compromise of legitimate server). Once installed, exploitation is automatic.",
|
|
439
|
+
"patch_available": true,
|
|
440
|
+
"patch_required_reboot": false,
|
|
441
|
+
"live_patch_available": true,
|
|
442
|
+
"live_patch_tools": [
|
|
443
|
+
"IDE update — vendor patch"
|
|
444
|
+
],
|
|
445
|
+
"framework_control_gaps": {
|
|
446
|
+
"NIST-800-53-SA-12": "Supply chain protection doesn't contemplate MCP server trust as a category.",
|
|
447
|
+
"NIST-800-53-CM-7": "Least functionality doesn't address AI tool plugin authorization.",
|
|
448
|
+
"ISO-27001-2022-A.8.30": "Outsourced development controls don't cover MCP server trust.",
|
|
449
|
+
"SOC2-CC9": "Vendor management doesn't reach developer-installed AI tool plugins."
|
|
450
|
+
},
|
|
451
|
+
"atlas_refs": [
|
|
452
|
+
"AML.T0010",
|
|
453
|
+
"AML.T0016"
|
|
454
|
+
],
|
|
455
|
+
"attack_refs": [
|
|
456
|
+
"T1195.001",
|
|
457
|
+
"T1059"
|
|
458
|
+
],
|
|
459
|
+
"rwep_score": 35,
|
|
460
|
+
"rwep_factors": {
|
|
461
|
+
"cisa_kev": 0,
|
|
462
|
+
"poc_available": 20,
|
|
463
|
+
"ai_factor": 0,
|
|
464
|
+
"active_exploitation": 10,
|
|
465
|
+
"blast_radius": 30,
|
|
466
|
+
"patch_available": -15,
|
|
467
|
+
"live_patch_available": -10,
|
|
468
|
+
"reboot_required": 0
|
|
469
|
+
},
|
|
470
|
+
"epss_score": 0.14,
|
|
471
|
+
"epss_percentile": 0.86,
|
|
472
|
+
"epss_date": "2026-05-11",
|
|
473
|
+
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2026-30615",
|
|
474
|
+
"source_verified": "2026-05-01",
|
|
475
|
+
"verification_sources": [
|
|
476
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2026-30615"
|
|
477
|
+
],
|
|
478
|
+
"vendor_advisories": [
|
|
479
|
+
{
|
|
480
|
+
"vendor": "Codeium / Windsurf",
|
|
481
|
+
"advisory_id": null,
|
|
482
|
+
"url": "https://codeium.com/security/CVE-2026-30615",
|
|
483
|
+
"severity": "critical",
|
|
484
|
+
"published_date": "2026-02-18"
|
|
485
|
+
},
|
|
486
|
+
{
|
|
487
|
+
"vendor": "GitHub Security Advisories",
|
|
488
|
+
"advisory_id": null,
|
|
489
|
+
"url": "https://github.com/advisories?query=CVE-2026-30615",
|
|
490
|
+
"severity": "critical",
|
|
491
|
+
"published_date": "2026-02-19"
|
|
492
|
+
}
|
|
493
|
+
],
|
|
494
|
+
"last_updated": "2026-05-11"
|
|
495
|
+
}
|
|
496
|
+
}
|