@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
|
@@ -0,0 +1,1017 @@
|
|
|
1
|
+
{
|
|
2
|
+
"_meta": {
|
|
3
|
+
"schema_version": "1.0.0",
|
|
4
|
+
"last_updated": "2026-05-11",
|
|
5
|
+
"cwe_version": "4.16",
|
|
6
|
+
"cwe_version_release_date": "2024-11-19",
|
|
7
|
+
"source": "https://cwe.mitre.org",
|
|
8
|
+
"view_general": "CWE View 1003 (Weaknesses for Simplified Mapping of Published Vulnerabilities)",
|
|
9
|
+
"view_research": "CWE View 1000 (Research Concepts)",
|
|
10
|
+
"view_ai_ml": "CWE View 1425 (AI/ML Weaknesses)",
|
|
11
|
+
"view_top_25_2024": "CWE View 1430 (2024 CWE Top 25 Most Dangerous Software Weaknesses)",
|
|
12
|
+
"skill_refs_field": "cwe_refs",
|
|
13
|
+
"note": "CWE Top 25 ranks reflect the 2024 release published by MITRE / CISA on 2024-11-20 (View CWE-1430). The 2025 release was not yet published as of pin date 2026-05-11; top_25_rank_2025 is null for all entries until the next list ships. CVE-to-CWE assignments use the primary NVD classification where known; secondary classes are noted in lag_notes. Per AGENTS.md hard rule #10, this file contains real CWE IDs only — entries without a defensible public mapping were omitted rather than fabricated. Some CVE-to-CWE mappings could not be confidently justified (see project report); those CVEs do not appear in evidence_cves for the relevant CWE entry.",
|
|
14
|
+
"tlp": "CLEAR",
|
|
15
|
+
"source_confidence": {
|
|
16
|
+
"scheme": "Admiralty (A-F + 1-6)",
|
|
17
|
+
"default": "A1",
|
|
18
|
+
"note": "B = usually reliable; 2 = probably true. Per-entry overrides via entry-level source_confidence field. Public-record catalogs (NVD, ATLAS, CWE, RFC, framework publishers) get A1 (completely reliable, confirmed). Project-curated catalogs (zeroday-lessons, exploit-availability) default to B2 with source citations."
|
|
19
|
+
},
|
|
20
|
+
"freshness_policy": {
|
|
21
|
+
"default_review_cadence_days": 90,
|
|
22
|
+
"stale_after_days": 180,
|
|
23
|
+
"rebuild_after_days": 365,
|
|
24
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
25
|
+
}
|
|
26
|
+
},
|
|
27
|
+
"CWE-787": {
|
|
28
|
+
"id": "CWE-787",
|
|
29
|
+
"name": "Out-of-bounds Write",
|
|
30
|
+
"abstraction": "Base",
|
|
31
|
+
"category": "Memory Safety",
|
|
32
|
+
"description": "The product writes data past the end, or before the beginning, of the intended buffer. Out-of-bounds writes corrupt adjacent memory and are the dominant root cause of kernel and userland remote/local code execution exploits in C/C++ codebases.",
|
|
33
|
+
"top_25_rank_2024": 2,
|
|
34
|
+
"top_25_rank_2025": null,
|
|
35
|
+
"view_memberships": [
|
|
36
|
+
"CWE-1003",
|
|
37
|
+
"CWE-1000",
|
|
38
|
+
"CWE-1430"
|
|
39
|
+
],
|
|
40
|
+
"related_attack_patterns_capec": [
|
|
41
|
+
"CAPEC-100",
|
|
42
|
+
"CAPEC-14",
|
|
43
|
+
"CAPEC-46",
|
|
44
|
+
"CAPEC-540"
|
|
45
|
+
],
|
|
46
|
+
"skills_referencing": [
|
|
47
|
+
"kernel-lpe-triage",
|
|
48
|
+
"exploit-scoring",
|
|
49
|
+
"zeroday-gap-learn"
|
|
50
|
+
],
|
|
51
|
+
"evidence_cves": [
|
|
52
|
+
"CVE-2026-31431"
|
|
53
|
+
],
|
|
54
|
+
"framework_controls_partially_addressing": [
|
|
55
|
+
"NIST-800-53-SI-10",
|
|
56
|
+
"NIST-800-53-SI-16",
|
|
57
|
+
"ISO-27001-2022-A.8.28",
|
|
58
|
+
"ISO-27001-2022-A.8.25"
|
|
59
|
+
],
|
|
60
|
+
"real_requirement": "Mandatory memory-safe language adoption for new kernel and security-boundary code (Rust-for-Linux, eBPF verifier, hypervisor); KASAN/UBSAN/HWASAN in continuous fuzzing for legacy C; structured bounds-checking annotations enforced at compile time. SI-10 input validation alone is insufficient — write-path bounds checking must be a structural property of the type system, not a runtime check the developer must remember.",
|
|
61
|
+
"lag_notes": "NIST SI-10 frames bounds violations as 'input validation' failures, which mischaracterizes the weakness — Copy Fail (CVE-2026-31431) had no untrusted input boundary in the traditional sense; it was a deterministic write past a kernel-internal buffer. ISO-27001 A.8.28 (secure coding) does not mandate memory-safe language adoption.",
|
|
62
|
+
"last_verified": "2026-05-11"
|
|
63
|
+
},
|
|
64
|
+
"CWE-79": {
|
|
65
|
+
"id": "CWE-79",
|
|
66
|
+
"name": "Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)",
|
|
67
|
+
"abstraction": "Base",
|
|
68
|
+
"category": "Injection",
|
|
69
|
+
"description": "The product does not neutralize user-controllable input before placing it in output used as a web page served to other users. XSS remains the number one weakness in the 2024 Top 25 due to template-engine misuse, framework escape-hatch APIs, and DOM-clobbering in single-page applications.",
|
|
70
|
+
"top_25_rank_2024": 1,
|
|
71
|
+
"top_25_rank_2025": null,
|
|
72
|
+
"view_memberships": [
|
|
73
|
+
"CWE-1003",
|
|
74
|
+
"CWE-1000",
|
|
75
|
+
"CWE-1430"
|
|
76
|
+
],
|
|
77
|
+
"related_attack_patterns_capec": [
|
|
78
|
+
"CAPEC-63",
|
|
79
|
+
"CAPEC-588",
|
|
80
|
+
"CAPEC-591",
|
|
81
|
+
"CAPEC-592"
|
|
82
|
+
],
|
|
83
|
+
"skills_referencing": [
|
|
84
|
+
"exploit-scoring"
|
|
85
|
+
],
|
|
86
|
+
"evidence_cves": [],
|
|
87
|
+
"framework_controls_partially_addressing": [
|
|
88
|
+
"NIST-800-53-SI-10",
|
|
89
|
+
"NIST-800-53-SC-18",
|
|
90
|
+
"ISO-27001-2022-A.8.28",
|
|
91
|
+
"PCI-DSS-4.0-6.2.4"
|
|
92
|
+
],
|
|
93
|
+
"real_requirement": "Context-aware auto-escaping enforced by the framework with no opt-out for user-influenced data; CSP with nonce-based strict-dynamic; Trusted Types enforced in production for browser-rendered output. Code review alone does not catch XSS in modern SPA codebases.",
|
|
94
|
+
"lag_notes": "PCI-DSS 6.2.4 still treats XSS as a code-review finding rather than a framework configuration finding. NIST SC-18 (mobile code) predates the SPA / DOM-XSS era and does not contemplate Trusted Types or CSP nonce enforcement.",
|
|
95
|
+
"last_verified": "2026-05-11"
|
|
96
|
+
},
|
|
97
|
+
"CWE-89": {
|
|
98
|
+
"id": "CWE-89",
|
|
99
|
+
"name": "Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)",
|
|
100
|
+
"abstraction": "Base",
|
|
101
|
+
"category": "Injection",
|
|
102
|
+
"description": "The product constructs SQL using externally-influenced input without neutralizing special elements. SQLi remains in the Top 5 despite parameterized-query availability for two decades because ORM raw-query escape hatches, AI-generated string-concat code, and second-order injection through caches keep reintroducing it.",
|
|
103
|
+
"top_25_rank_2024": 3,
|
|
104
|
+
"top_25_rank_2025": null,
|
|
105
|
+
"view_memberships": [
|
|
106
|
+
"CWE-1003",
|
|
107
|
+
"CWE-1000",
|
|
108
|
+
"CWE-1430"
|
|
109
|
+
],
|
|
110
|
+
"related_attack_patterns_capec": [
|
|
111
|
+
"CAPEC-66",
|
|
112
|
+
"CAPEC-7",
|
|
113
|
+
"CAPEC-470"
|
|
114
|
+
],
|
|
115
|
+
"skills_referencing": [
|
|
116
|
+
"exploit-scoring"
|
|
117
|
+
],
|
|
118
|
+
"evidence_cves": [],
|
|
119
|
+
"framework_controls_partially_addressing": [
|
|
120
|
+
"NIST-800-53-SI-10",
|
|
121
|
+
"ISO-27001-2022-A.8.28",
|
|
122
|
+
"PCI-DSS-4.0-6.2.4"
|
|
123
|
+
],
|
|
124
|
+
"real_requirement": "Parameterized queries enforced at the ORM/driver level with raw-query usage gated by code-owner approval; AI-assisted code review flagging string-concat SQL patterns from LLM-generated code (a documented regression vector in 2024-2026 codebases).",
|
|
125
|
+
"lag_notes": "DR-5 applies: AI code generation is a current re-introduction vector for SQLi in codebases that had previously eliminated it. No framework control acknowledges LLM-generated code as a regression source.",
|
|
126
|
+
"last_verified": "2026-05-11"
|
|
127
|
+
},
|
|
128
|
+
"CWE-416": {
|
|
129
|
+
"id": "CWE-416",
|
|
130
|
+
"name": "Use After Free",
|
|
131
|
+
"abstraction": "Variant",
|
|
132
|
+
"category": "Memory Safety",
|
|
133
|
+
"description": "Referencing memory after it has been freed causes a program to crash, use unexpected values, or execute attacker-controlled code. UAF is the dominant kernel/browser RCE primitive of the last decade and a frequent root cause for IPsec, netfilter, and io_uring class kernel CVEs.",
|
|
134
|
+
"top_25_rank_2024": 8,
|
|
135
|
+
"top_25_rank_2025": null,
|
|
136
|
+
"view_memberships": [
|
|
137
|
+
"CWE-1003",
|
|
138
|
+
"CWE-1000",
|
|
139
|
+
"CWE-1430"
|
|
140
|
+
],
|
|
141
|
+
"related_attack_patterns_capec": [
|
|
142
|
+
"CAPEC-129"
|
|
143
|
+
],
|
|
144
|
+
"skills_referencing": [
|
|
145
|
+
"kernel-lpe-triage",
|
|
146
|
+
"exploit-scoring"
|
|
147
|
+
],
|
|
148
|
+
"evidence_cves": [
|
|
149
|
+
"CVE-2026-43284",
|
|
150
|
+
"CVE-2026-43500"
|
|
151
|
+
],
|
|
152
|
+
"framework_controls_partially_addressing": [
|
|
153
|
+
"NIST-800-53-SI-16",
|
|
154
|
+
"NIST-800-53-SI-2",
|
|
155
|
+
"ISO-27001-2022-A.8.28"
|
|
156
|
+
],
|
|
157
|
+
"real_requirement": "Memory-safe rewrite of attack-surface subsystems (IPsec stack, packet reassembly, allocators); SLAB_VIRTUAL / heap hardening enabled in production kernels; KASAN-enabled fleet canaries. SI-16 'memory protection' as defined in NIST is satisfied by NX/ASLR, which UAF exploits routinely bypass via heap spray plus grooming.",
|
|
158
|
+
"lag_notes": "NIST SI-16 considers UAF mitigation 'addressed' if ASLR and NX are enabled. Modern UAF exploitation pipelines defeat both. NIST has not introduced a control for memory-safe-by-default for high-blast-radius subsystems.",
|
|
159
|
+
"last_verified": "2026-05-11"
|
|
160
|
+
},
|
|
161
|
+
"CWE-20": {
|
|
162
|
+
"id": "CWE-20",
|
|
163
|
+
"name": "Improper Input Validation",
|
|
164
|
+
"abstraction": "Class",
|
|
165
|
+
"category": "Validation",
|
|
166
|
+
"description": "The product receives input but does not validate or incorrectly validates that the input has the properties required to safely process it. CWE-20 is the parent class for many concrete injection and overflow CWEs and remains in the Top 25 as a backstop classification.",
|
|
167
|
+
"top_25_rank_2024": 6,
|
|
168
|
+
"top_25_rank_2025": null,
|
|
169
|
+
"view_memberships": [
|
|
170
|
+
"CWE-1003",
|
|
171
|
+
"CWE-1000",
|
|
172
|
+
"CWE-1430"
|
|
173
|
+
],
|
|
174
|
+
"related_attack_patterns_capec": [
|
|
175
|
+
"CAPEC-3",
|
|
176
|
+
"CAPEC-10",
|
|
177
|
+
"CAPEC-22"
|
|
178
|
+
],
|
|
179
|
+
"skills_referencing": [
|
|
180
|
+
"ai-attack-surface",
|
|
181
|
+
"rag-pipeline-security",
|
|
182
|
+
"exploit-scoring"
|
|
183
|
+
],
|
|
184
|
+
"evidence_cves": [],
|
|
185
|
+
"framework_controls_partially_addressing": [
|
|
186
|
+
"NIST-800-53-SI-10",
|
|
187
|
+
"ISO-27001-2022-A.8.28",
|
|
188
|
+
"PCI-DSS-4.0-6.2.4"
|
|
189
|
+
],
|
|
190
|
+
"real_requirement": "Schema-based input validation at trust boundaries with deny-by-default; for AI pipelines, input validation must include semantic-class validation (is this prompt text? Is it a tool-call structure?) not just syntactic validation. Prompt content cannot be validated by SI-10 syntactically.",
|
|
191
|
+
"lag_notes": "SI-10 treats validation as a syntactic operation. For LLM/RAG inputs, semantic validation is required (the input may be syntactically valid JSON but semantically a jailbreak payload). No framework operationalizes semantic validation for AI inputs.",
|
|
192
|
+
"last_verified": "2026-05-11"
|
|
193
|
+
},
|
|
194
|
+
"CWE-78": {
|
|
195
|
+
"id": "CWE-78",
|
|
196
|
+
"name": "Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)",
|
|
197
|
+
"abstraction": "Base",
|
|
198
|
+
"category": "Injection",
|
|
199
|
+
"description": "The product constructs an OS command using externally-influenced input without neutralizing special elements. OS command injection is the canonical class for CI/CD pipeline RCE, MCP tool shell-wrapper RCE, and developer-tooling agentic RCE.",
|
|
200
|
+
"top_25_rank_2024": 7,
|
|
201
|
+
"top_25_rank_2025": null,
|
|
202
|
+
"view_memberships": [
|
|
203
|
+
"CWE-1003",
|
|
204
|
+
"CWE-1000",
|
|
205
|
+
"CWE-1430"
|
|
206
|
+
],
|
|
207
|
+
"related_attack_patterns_capec": [
|
|
208
|
+
"CAPEC-88",
|
|
209
|
+
"CAPEC-6"
|
|
210
|
+
],
|
|
211
|
+
"skills_referencing": [
|
|
212
|
+
"mcp-agent-trust",
|
|
213
|
+
"ai-attack-surface",
|
|
214
|
+
"exploit-scoring"
|
|
215
|
+
],
|
|
216
|
+
"evidence_cves": [],
|
|
217
|
+
"framework_controls_partially_addressing": [
|
|
218
|
+
"NIST-800-53-SI-10",
|
|
219
|
+
"ISO-27001-2022-A.8.28"
|
|
220
|
+
],
|
|
221
|
+
"real_requirement": "Avoid shell invocation entirely; use execve-style arg arrays. For MCP tools that wrap shells, allowlist tool argv structure at the protocol layer; refuse any tool that accepts unstructured string commands as input. NIST SI-10 does not contemplate AI agents as command-injection vectors.",
|
|
222
|
+
"lag_notes": "MCP tools that accept natural-language commands and translate to shell are a CWE-78 vector that no framework treats as a first-class issue. Treated as 'tool design' rather than 'injection.'",
|
|
223
|
+
"last_verified": "2026-05-11"
|
|
224
|
+
},
|
|
225
|
+
"CWE-94": {
|
|
226
|
+
"id": "CWE-94",
|
|
227
|
+
"name": "Improper Control of Generation of Code (Code Injection)",
|
|
228
|
+
"abstraction": "Class",
|
|
229
|
+
"category": "Injection",
|
|
230
|
+
"description": "The product constructs code from externally-influenced input without neutralizing special elements that could modify the syntax or behavior of the generated code. CWE-94 is the canonical class for prompt-injection-to-RCE in agentic tools where the LLM emits executable code or tool calls based on attacker-influenced context.",
|
|
231
|
+
"top_25_rank_2024": 11,
|
|
232
|
+
"top_25_rank_2025": null,
|
|
233
|
+
"view_memberships": [
|
|
234
|
+
"CWE-1003",
|
|
235
|
+
"CWE-1000",
|
|
236
|
+
"CWE-1430"
|
|
237
|
+
],
|
|
238
|
+
"related_attack_patterns_capec": [
|
|
239
|
+
"CAPEC-242",
|
|
240
|
+
"CAPEC-35"
|
|
241
|
+
],
|
|
242
|
+
"skills_referencing": [
|
|
243
|
+
"ai-attack-surface",
|
|
244
|
+
"mcp-agent-trust",
|
|
245
|
+
"rag-pipeline-security",
|
|
246
|
+
"ai-c2-detection"
|
|
247
|
+
],
|
|
248
|
+
"evidence_cves": [
|
|
249
|
+
"CVE-2025-53773",
|
|
250
|
+
"CVE-2026-30615"
|
|
251
|
+
],
|
|
252
|
+
"framework_controls_partially_addressing": [
|
|
253
|
+
"NIST-800-53-SI-10",
|
|
254
|
+
"NIST-800-53-AC-2",
|
|
255
|
+
"ISO-27001-2022-A.8.28"
|
|
256
|
+
],
|
|
257
|
+
"real_requirement": "For agentic tools: structural separation of instruction channels (system prompt) from data channels (retrieved content, tool outputs); no prompt-controlled code emission without out-of-band human confirmation for high-impact actions; capability-scoped tool sandboxes. SI-10 input validation cannot remediate CWE-94 in an LLM context because the 'code' is generated post-validation by the model itself.",
|
|
258
|
+
"lag_notes": "Microsoft's NVD advisory for CVE-2025-53773 maps the Copilot RCE to CWE-94. Some vendor advisories use CWE-77 (Command Injection) as a secondary classification — both are defensible. AGENTS.md DR-1 applies: no framework treats LLM code or tool-call emission as a CWE-94 class, so SI-10 cannot be claimed adequate.",
|
|
259
|
+
"last_verified": "2026-05-11"
|
|
260
|
+
},
|
|
261
|
+
"CWE-22": {
|
|
262
|
+
"id": "CWE-22",
|
|
263
|
+
"name": "Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)",
|
|
264
|
+
"abstraction": "Base",
|
|
265
|
+
"category": "Path/Resource",
|
|
266
|
+
"description": "The product uses external input to construct a pathname intended to identify a file or directory but does not properly neutralize sequences such as dot-dot that can resolve outside the restricted directory. Re-emerged as critical via MCP tools that expose file-read primitives to LLM-driven argument selection.",
|
|
267
|
+
"top_25_rank_2024": 5,
|
|
268
|
+
"top_25_rank_2025": null,
|
|
269
|
+
"view_memberships": [
|
|
270
|
+
"CWE-1003",
|
|
271
|
+
"CWE-1000",
|
|
272
|
+
"CWE-1430"
|
|
273
|
+
],
|
|
274
|
+
"related_attack_patterns_capec": [
|
|
275
|
+
"CAPEC-126",
|
|
276
|
+
"CAPEC-76"
|
|
277
|
+
],
|
|
278
|
+
"skills_referencing": [
|
|
279
|
+
"mcp-agent-trust"
|
|
280
|
+
],
|
|
281
|
+
"evidence_cves": [],
|
|
282
|
+
"framework_controls_partially_addressing": [
|
|
283
|
+
"NIST-800-53-AC-3",
|
|
284
|
+
"NIST-800-53-SI-10",
|
|
285
|
+
"ISO-27001-2022-A.5.15"
|
|
286
|
+
],
|
|
287
|
+
"real_requirement": "Canonicalize-then-prefix-check; openat2 with RESOLVE_BENEATH on Linux; chroot or per-tool filesystem capabilities for MCP tools. AC-3 enforcement is satisfied by the OS file ACL — which is irrelevant when the agent has legitimate read access to the parent directory but should not have access to subpaths revealed by traversal.",
|
|
288
|
+
"lag_notes": "No framework requires per-tool filesystem capability scoping for AI agents — agents inherit their host process's full filesystem access, making CWE-22 effectively a privilege escalation in the agentic context.",
|
|
289
|
+
"last_verified": "2026-05-11"
|
|
290
|
+
},
|
|
291
|
+
"CWE-352": {
|
|
292
|
+
"id": "CWE-352",
|
|
293
|
+
"name": "Cross-Site Request Forgery (CSRF)",
|
|
294
|
+
"abstraction": "Compound",
|
|
295
|
+
"category": "Session",
|
|
296
|
+
"description": "The web application does not, or cannot, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. SameSite cookie defaults reduced CSRF risk but did not eliminate it for cross-origin POST and JSON APIs.",
|
|
297
|
+
"top_25_rank_2024": 9,
|
|
298
|
+
"top_25_rank_2025": null,
|
|
299
|
+
"view_memberships": [
|
|
300
|
+
"CWE-1003",
|
|
301
|
+
"CWE-1000",
|
|
302
|
+
"CWE-1430"
|
|
303
|
+
],
|
|
304
|
+
"related_attack_patterns_capec": [
|
|
305
|
+
"CAPEC-62"
|
|
306
|
+
],
|
|
307
|
+
"skills_referencing": [],
|
|
308
|
+
"evidence_cves": [],
|
|
309
|
+
"framework_controls_partially_addressing": [
|
|
310
|
+
"NIST-800-53-SC-23",
|
|
311
|
+
"ISO-27001-2022-A.8.26"
|
|
312
|
+
],
|
|
313
|
+
"real_requirement": "SameSite=Strict on session cookies; double-submit token or origin check on all state-changing endpoints; deny cross-origin requests with credentials by default at the framework layer.",
|
|
314
|
+
"lag_notes": "SC-23 'session authenticity' is satisfied by session tokens but does not require origin-binding or SameSite enforcement. Frameworks lag the modern SPA plus cross-origin reality.",
|
|
315
|
+
"last_verified": "2026-05-11"
|
|
316
|
+
},
|
|
317
|
+
"CWE-862": {
|
|
318
|
+
"id": "CWE-862",
|
|
319
|
+
"name": "Missing Authorization",
|
|
320
|
+
"abstraction": "Class",
|
|
321
|
+
"category": "Authorization",
|
|
322
|
+
"description": "The product does not perform an authorization check when an actor attempts to access a resource or perform an action. Top 25 number four in 2024; the canonical broken-access-control class for API endpoints that authenticate but do not authorize per-object.",
|
|
323
|
+
"top_25_rank_2024": 4,
|
|
324
|
+
"top_25_rank_2025": null,
|
|
325
|
+
"view_memberships": [
|
|
326
|
+
"CWE-1003",
|
|
327
|
+
"CWE-1000",
|
|
328
|
+
"CWE-1430"
|
|
329
|
+
],
|
|
330
|
+
"related_attack_patterns_capec": [
|
|
331
|
+
"CAPEC-1",
|
|
332
|
+
"CAPEC-115"
|
|
333
|
+
],
|
|
334
|
+
"skills_referencing": [],
|
|
335
|
+
"evidence_cves": [],
|
|
336
|
+
"framework_controls_partially_addressing": [
|
|
337
|
+
"NIST-800-53-AC-3",
|
|
338
|
+
"NIST-800-53-AC-6",
|
|
339
|
+
"ISO-27001-2022-A.5.15",
|
|
340
|
+
"SOC2-CC6.1"
|
|
341
|
+
],
|
|
342
|
+
"real_requirement": "Authorization enforced as a policy decision point separate from authentication; per-object access control with deny-by-default; AI agent invocations require session-level authorization context distinct from the underlying service account's authorization.",
|
|
343
|
+
"lag_notes": "SOC 2 CC6.1 (per DR-1) defines logical access controls but does not require per-object authorization checks or AI-agent-session authorization contexts.",
|
|
344
|
+
"last_verified": "2026-05-11"
|
|
345
|
+
},
|
|
346
|
+
"CWE-434": {
|
|
347
|
+
"id": "CWE-434",
|
|
348
|
+
"name": "Unrestricted Upload of File with Dangerous Type",
|
|
349
|
+
"abstraction": "Base",
|
|
350
|
+
"category": "File Handling",
|
|
351
|
+
"description": "The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.",
|
|
352
|
+
"top_25_rank_2024": 10,
|
|
353
|
+
"top_25_rank_2025": null,
|
|
354
|
+
"view_memberships": [
|
|
355
|
+
"CWE-1003",
|
|
356
|
+
"CWE-1000",
|
|
357
|
+
"CWE-1430"
|
|
358
|
+
],
|
|
359
|
+
"related_attack_patterns_capec": [
|
|
360
|
+
"CAPEC-1",
|
|
361
|
+
"CAPEC-650"
|
|
362
|
+
],
|
|
363
|
+
"skills_referencing": [],
|
|
364
|
+
"evidence_cves": [],
|
|
365
|
+
"framework_controls_partially_addressing": [
|
|
366
|
+
"NIST-800-53-SI-3",
|
|
367
|
+
"NIST-800-53-SI-10",
|
|
368
|
+
"ISO-27001-2022-A.8.7"
|
|
369
|
+
],
|
|
370
|
+
"real_requirement": "Content-type validation by magic bytes (not Content-Type header); rename uploaded files with random IDs; store outside webroot; serve via signed-URL proxy; for AI/RAG pipelines, validate uploaded document types are within the corpus schema.",
|
|
371
|
+
"lag_notes": "SI-3 (malicious code protection) checks AV signatures but does not contemplate uploaded prompt-injection payloads inside documents that are dangerous-by-content rather than dangerous-by-type.",
|
|
372
|
+
"last_verified": "2026-05-11"
|
|
373
|
+
},
|
|
374
|
+
"CWE-77": {
|
|
375
|
+
"id": "CWE-77",
|
|
376
|
+
"name": "Improper Neutralization of Special Elements used in a Command (Command Injection)",
|
|
377
|
+
"abstraction": "Class",
|
|
378
|
+
"category": "Injection",
|
|
379
|
+
"description": "The product constructs all or part of a command using externally-influenced input without neutralizing special elements that could modify the intended command. Parent class of CWE-78 (OS) and CWE-89 (SQL); a secondary classification used in some MCP and agentic-tool advisories.",
|
|
380
|
+
"top_25_rank_2024": 16,
|
|
381
|
+
"top_25_rank_2025": null,
|
|
382
|
+
"view_memberships": [
|
|
383
|
+
"CWE-1003",
|
|
384
|
+
"CWE-1000",
|
|
385
|
+
"CWE-1430"
|
|
386
|
+
],
|
|
387
|
+
"related_attack_patterns_capec": [
|
|
388
|
+
"CAPEC-248",
|
|
389
|
+
"CAPEC-15"
|
|
390
|
+
],
|
|
391
|
+
"skills_referencing": [
|
|
392
|
+
"mcp-agent-trust",
|
|
393
|
+
"ai-attack-surface"
|
|
394
|
+
],
|
|
395
|
+
"evidence_cves": [],
|
|
396
|
+
"framework_controls_partially_addressing": [
|
|
397
|
+
"NIST-800-53-SI-10",
|
|
398
|
+
"ISO-27001-2022-A.8.28"
|
|
399
|
+
],
|
|
400
|
+
"real_requirement": "Structured command APIs at every command boundary (DB driver, OS exec, MCP tool argv); reject unstructured-string command interfaces in new MCP tool designs.",
|
|
401
|
+
"lag_notes": "Used as the parent classification by some vendor advisories where the precise sub-class (CWE-78 vs CWE-94) is ambiguous; cited here so skill authors can defensibly use either.",
|
|
402
|
+
"last_verified": "2026-05-11"
|
|
403
|
+
},
|
|
404
|
+
"CWE-502": {
|
|
405
|
+
"id": "CWE-502",
|
|
406
|
+
"name": "Deserialization of Untrusted Data",
|
|
407
|
+
"abstraction": "Base",
|
|
408
|
+
"category": "Serialization",
|
|
409
|
+
"description": "The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. Code-executing serialization formats used for ML model checkpoint loading from HuggingFace and similar registries keep CWE-502 critical for AI/ML pipelines.",
|
|
410
|
+
"top_25_rank_2024": 15,
|
|
411
|
+
"top_25_rank_2025": null,
|
|
412
|
+
"view_memberships": [
|
|
413
|
+
"CWE-1003",
|
|
414
|
+
"CWE-1000",
|
|
415
|
+
"CWE-1425",
|
|
416
|
+
"CWE-1430"
|
|
417
|
+
],
|
|
418
|
+
"related_attack_patterns_capec": [
|
|
419
|
+
"CAPEC-586"
|
|
420
|
+
],
|
|
421
|
+
"skills_referencing": [
|
|
422
|
+
"ai-attack-surface",
|
|
423
|
+
"mcp-agent-trust"
|
|
424
|
+
],
|
|
425
|
+
"evidence_cves": [],
|
|
426
|
+
"framework_controls_partially_addressing": [
|
|
427
|
+
"NIST-800-53-SI-10",
|
|
428
|
+
"NIST-800-53-SA-12",
|
|
429
|
+
"ISO-27001-2022-A.8.30"
|
|
430
|
+
],
|
|
431
|
+
"real_requirement": "Reject code-executing serialization formats for model loading in production; require safetensors or equivalent type-safe formats; for legacy code-executing formats, run inside an unprivileged, network-isolated sandbox; verify cryptographic signatures of model artifacts before deserialization.",
|
|
432
|
+
"lag_notes": "SA-12 supply-chain controls assume binaries can be hash-verified — they do not address that certain serialization formats execute code on load, making hash-of-bad-blob still dangerous.",
|
|
433
|
+
"last_verified": "2026-05-11"
|
|
434
|
+
},
|
|
435
|
+
"CWE-918": {
|
|
436
|
+
"id": "CWE-918",
|
|
437
|
+
"name": "Server-Side Request Forgery (SSRF)",
|
|
438
|
+
"abstraction": "Base",
|
|
439
|
+
"category": "Network",
|
|
440
|
+
"description": "The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL but does not sufficiently ensure that the request is being sent to the expected destination. SSRF is the canonical primitive for cloud metadata service abuse and is amplified in AI/RAG pipelines that fetch URLs from prompt-controlled context.",
|
|
441
|
+
"top_25_rank_2024": 19,
|
|
442
|
+
"top_25_rank_2025": null,
|
|
443
|
+
"view_memberships": [
|
|
444
|
+
"CWE-1003",
|
|
445
|
+
"CWE-1000",
|
|
446
|
+
"CWE-1430"
|
|
447
|
+
],
|
|
448
|
+
"related_attack_patterns_capec": [
|
|
449
|
+
"CAPEC-664"
|
|
450
|
+
],
|
|
451
|
+
"skills_referencing": [
|
|
452
|
+
"rag-pipeline-security",
|
|
453
|
+
"ai-attack-surface"
|
|
454
|
+
],
|
|
455
|
+
"evidence_cves": [],
|
|
456
|
+
"framework_controls_partially_addressing": [
|
|
457
|
+
"NIST-800-53-SC-7",
|
|
458
|
+
"ISO-27001-2022-A.8.22"
|
|
459
|
+
],
|
|
460
|
+
"real_requirement": "Egress allowlist enforced at the network layer; IMDSv2 with hop-limit=1; for RAG/agent URL fetchers, allowlist of fetchable domains and explicit rejection of RFC 1918 / link-local / metadata IPs after DNS resolution (resolve-then-check, not check-then-resolve).",
|
|
461
|
+
"lag_notes": "SC-7 boundary protection assumes the application is the trust boundary; SSRF makes the application the attacker's proxy across the boundary. Cloud IMDS abuse remains a top SSRF outcome.",
|
|
462
|
+
"last_verified": "2026-05-11"
|
|
463
|
+
},
|
|
464
|
+
"CWE-287": {
|
|
465
|
+
"id": "CWE-287",
|
|
466
|
+
"name": "Improper Authentication",
|
|
467
|
+
"abstraction": "Class",
|
|
468
|
+
"category": "Authentication",
|
|
469
|
+
"description": "When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.",
|
|
470
|
+
"top_25_rank_2024": 14,
|
|
471
|
+
"top_25_rank_2025": null,
|
|
472
|
+
"view_memberships": [
|
|
473
|
+
"CWE-1003",
|
|
474
|
+
"CWE-1000",
|
|
475
|
+
"CWE-1430"
|
|
476
|
+
],
|
|
477
|
+
"related_attack_patterns_capec": [
|
|
478
|
+
"CAPEC-115",
|
|
479
|
+
"CAPEC-22"
|
|
480
|
+
],
|
|
481
|
+
"skills_referencing": [],
|
|
482
|
+
"evidence_cves": [],
|
|
483
|
+
"framework_controls_partially_addressing": [
|
|
484
|
+
"NIST-800-53-IA-2",
|
|
485
|
+
"NIST-800-53-IA-8",
|
|
486
|
+
"ISO-27001-2022-A.5.17"
|
|
487
|
+
],
|
|
488
|
+
"real_requirement": "Phishing-resistant MFA (FIDO2/WebAuthn) for all human users; mTLS or signed JWT with audience binding for service-to-service; for AI agents, cryptographic agent identity tied to invocation context not the host service account.",
|
|
489
|
+
"lag_notes": "IA-2 still accepts SMS OTP as a valid MFA factor under some configurations; modern phishing kits defeat SMS OTP. AI agent authentication is undefined in IA-2/IA-8.",
|
|
490
|
+
"last_verified": "2026-05-11"
|
|
491
|
+
},
|
|
492
|
+
"CWE-269": {
|
|
493
|
+
"id": "CWE-269",
|
|
494
|
+
"name": "Improper Privilege Management",
|
|
495
|
+
"abstraction": "Class",
|
|
496
|
+
"category": "Authorization",
|
|
497
|
+
"description": "The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.",
|
|
498
|
+
"top_25_rank_2024": 22,
|
|
499
|
+
"top_25_rank_2025": null,
|
|
500
|
+
"view_memberships": [
|
|
501
|
+
"CWE-1003",
|
|
502
|
+
"CWE-1000",
|
|
503
|
+
"CWE-1430"
|
|
504
|
+
],
|
|
505
|
+
"related_attack_patterns_capec": [
|
|
506
|
+
"CAPEC-122",
|
|
507
|
+
"CAPEC-233"
|
|
508
|
+
],
|
|
509
|
+
"skills_referencing": [
|
|
510
|
+
"kernel-lpe-triage",
|
|
511
|
+
"mcp-agent-trust"
|
|
512
|
+
],
|
|
513
|
+
"evidence_cves": [],
|
|
514
|
+
"framework_controls_partially_addressing": [
|
|
515
|
+
"NIST-800-53-AC-6",
|
|
516
|
+
"ISO-27001-2022-A.8.2"
|
|
517
|
+
],
|
|
518
|
+
"real_requirement": "Least-privilege enforced through capability tokens, not role labels; per-action privilege drop for tool invocations; namespace plus cgroup plus seccomp for any process that spawns LLM-controlled subprocesses.",
|
|
519
|
+
"lag_notes": "AC-6 'least privilege' is reviewed at account provisioning, not at action invocation. For AI agents whose actions vary per-prompt, account-level least privilege is insufficient granularity.",
|
|
520
|
+
"last_verified": "2026-05-11"
|
|
521
|
+
},
|
|
522
|
+
"CWE-200": {
|
|
523
|
+
"id": "CWE-200",
|
|
524
|
+
"name": "Exposure of Sensitive Information to an Unauthorized Actor",
|
|
525
|
+
"abstraction": "Class",
|
|
526
|
+
"category": "Information Exposure",
|
|
527
|
+
"description": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. In AI/RAG systems, sensitive-data exfiltration via prompt-controlled context retrieval is a CWE-200 instance.",
|
|
528
|
+
"top_25_rank_2024": 17,
|
|
529
|
+
"top_25_rank_2025": null,
|
|
530
|
+
"view_memberships": [
|
|
531
|
+
"CWE-1003",
|
|
532
|
+
"CWE-1000",
|
|
533
|
+
"CWE-1430"
|
|
534
|
+
],
|
|
535
|
+
"related_attack_patterns_capec": [
|
|
536
|
+
"CAPEC-116",
|
|
537
|
+
"CAPEC-118"
|
|
538
|
+
],
|
|
539
|
+
"skills_referencing": [
|
|
540
|
+
"rag-pipeline-security",
|
|
541
|
+
"ai-attack-surface"
|
|
542
|
+
],
|
|
543
|
+
"evidence_cves": [],
|
|
544
|
+
"framework_controls_partially_addressing": [
|
|
545
|
+
"NIST-800-53-AC-3",
|
|
546
|
+
"NIST-800-53-SC-28",
|
|
547
|
+
"ISO-27001-2022-A.8.12"
|
|
548
|
+
],
|
|
549
|
+
"real_requirement": "RAG corpus access enforced at retrieval-time with caller identity, not at ingestion-time with corpus labels; redaction filters on LLM output for PII and secrets; logging that excludes prompt content containing secrets.",
|
|
550
|
+
"lag_notes": "Data-at-rest controls (SC-28) do not protect against context-window exfiltration where authorized data is retrieved by an authorized agent but exfiltrated via prompt-injection-induced output.",
|
|
551
|
+
"last_verified": "2026-05-11"
|
|
552
|
+
},
|
|
553
|
+
"CWE-863": {
|
|
554
|
+
"id": "CWE-863",
|
|
555
|
+
"name": "Incorrect Authorization",
|
|
556
|
+
"abstraction": "Class",
|
|
557
|
+
"category": "Authorization",
|
|
558
|
+
"description": "The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.",
|
|
559
|
+
"top_25_rank_2024": 24,
|
|
560
|
+
"top_25_rank_2025": null,
|
|
561
|
+
"view_memberships": [
|
|
562
|
+
"CWE-1003",
|
|
563
|
+
"CWE-1000",
|
|
564
|
+
"CWE-1430"
|
|
565
|
+
],
|
|
566
|
+
"related_attack_patterns_capec": [
|
|
567
|
+
"CAPEC-1"
|
|
568
|
+
],
|
|
569
|
+
"skills_referencing": [
|
|
570
|
+
"mcp-agent-trust"
|
|
571
|
+
],
|
|
572
|
+
"evidence_cves": [],
|
|
573
|
+
"framework_controls_partially_addressing": [
|
|
574
|
+
"NIST-800-53-AC-3",
|
|
575
|
+
"ISO-27001-2022-A.5.15"
|
|
576
|
+
],
|
|
577
|
+
"real_requirement": "Policy-as-code authorization with explicit deny-list-then-allowlist test coverage; per-tool authorization tests for MCP servers; invocation-time authorization for AI agent actions, separate from the agent's account-level permissions.",
|
|
578
|
+
"lag_notes": "Often distinguished from CWE-862 only at post-mortem; both classes are commonly conflated by framework controls that say 'authorization is enforced' without specifying the granularity.",
|
|
579
|
+
"last_verified": "2026-05-11"
|
|
580
|
+
},
|
|
581
|
+
"CWE-125": {
|
|
582
|
+
"id": "CWE-125",
|
|
583
|
+
"name": "Out-of-bounds Read",
|
|
584
|
+
"abstraction": "Base",
|
|
585
|
+
"category": "Memory Safety",
|
|
586
|
+
"description": "The product reads data past the end, or before the beginning, of the intended buffer. Frequent root cause for information disclosure (KASLR break, cryptographic key leak) in kernel CVEs.",
|
|
587
|
+
"top_25_rank_2024": 12,
|
|
588
|
+
"top_25_rank_2025": null,
|
|
589
|
+
"view_memberships": [
|
|
590
|
+
"CWE-1003",
|
|
591
|
+
"CWE-1000",
|
|
592
|
+
"CWE-1430"
|
|
593
|
+
],
|
|
594
|
+
"related_attack_patterns_capec": [
|
|
595
|
+
"CAPEC-540"
|
|
596
|
+
],
|
|
597
|
+
"skills_referencing": [
|
|
598
|
+
"kernel-lpe-triage",
|
|
599
|
+
"exploit-scoring"
|
|
600
|
+
],
|
|
601
|
+
"evidence_cves": [],
|
|
602
|
+
"framework_controls_partially_addressing": [
|
|
603
|
+
"NIST-800-53-SI-10",
|
|
604
|
+
"NIST-800-53-SI-16",
|
|
605
|
+
"ISO-27001-2022-A.8.28"
|
|
606
|
+
],
|
|
607
|
+
"real_requirement": "Same memory-safety requirements as CWE-787; additionally, KASLR is not a sufficient compensating control because OOB-read CVEs are routinely used to defeat KASLR before exploiting an OOB-write CVE.",
|
|
608
|
+
"lag_notes": "Treated as 'information disclosure' severity by frameworks; in practice OOB-read is the enabler for OOB-write chained RCE and should be scored as a precursor to code execution.",
|
|
609
|
+
"last_verified": "2026-05-11"
|
|
610
|
+
},
|
|
611
|
+
"CWE-672": {
|
|
612
|
+
"id": "CWE-672",
|
|
613
|
+
"name": "Operation on a Resource after Expiration or Release",
|
|
614
|
+
"abstraction": "Class",
|
|
615
|
+
"category": "Memory Safety",
|
|
616
|
+
"description": "The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. Parent class for CWE-416 (UAF) and related lifetime-management weaknesses; sometimes cited as the canonical class for kernel buffer-lifetime bugs where the specific UAF-vs-write classification is ambiguous.",
|
|
617
|
+
"top_25_rank_2024": null,
|
|
618
|
+
"top_25_rank_2025": null,
|
|
619
|
+
"view_memberships": [
|
|
620
|
+
"CWE-1000"
|
|
621
|
+
],
|
|
622
|
+
"related_attack_patterns_capec": [],
|
|
623
|
+
"skills_referencing": [
|
|
624
|
+
"kernel-lpe-triage"
|
|
625
|
+
],
|
|
626
|
+
"evidence_cves": [],
|
|
627
|
+
"framework_controls_partially_addressing": [
|
|
628
|
+
"NIST-800-53-SI-16",
|
|
629
|
+
"ISO-27001-2022-A.8.28"
|
|
630
|
+
],
|
|
631
|
+
"real_requirement": "Resource lifetime expressed in the type system (Rust ownership, RAII); static analyzers that prove no use-after-release on hot paths.",
|
|
632
|
+
"lag_notes": "Listed as a candidate primary class for Copy Fail (CVE-2026-31431) in some draft NVD threads; the primary NVD assignment is CWE-787 — CWE-672 is included here so skill authors can cite it for borderline kernel-lifetime cases.",
|
|
633
|
+
"last_verified": "2026-05-11"
|
|
634
|
+
},
|
|
635
|
+
"CWE-732": {
|
|
636
|
+
"id": "CWE-732",
|
|
637
|
+
"name": "Incorrect Permission Assignment for Critical Resource",
|
|
638
|
+
"abstraction": "Class",
|
|
639
|
+
"category": "Authorization",
|
|
640
|
+
"description": "The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. Frequent root cause for K8s RBAC, IAM policy, and cloud-bucket misconfigurations.",
|
|
641
|
+
"top_25_rank_2024": 13,
|
|
642
|
+
"top_25_rank_2025": null,
|
|
643
|
+
"view_memberships": [
|
|
644
|
+
"CWE-1003",
|
|
645
|
+
"CWE-1000",
|
|
646
|
+
"CWE-1430"
|
|
647
|
+
],
|
|
648
|
+
"related_attack_patterns_capec": [
|
|
649
|
+
"CAPEC-1"
|
|
650
|
+
],
|
|
651
|
+
"skills_referencing": [],
|
|
652
|
+
"evidence_cves": [],
|
|
653
|
+
"framework_controls_partially_addressing": [
|
|
654
|
+
"NIST-800-53-AC-3",
|
|
655
|
+
"NIST-800-53-AC-6",
|
|
656
|
+
"ISO-27001-2022-A.5.15"
|
|
657
|
+
],
|
|
658
|
+
"real_requirement": "IaC-scanned permission policies in CI; deny-by-default cloud account baselines; periodic effective-permission graph review (not just per-policy review).",
|
|
659
|
+
"lag_notes": "AC-3 review at policy-grant time misses transitive permission graphs in cloud IAM and K8s RBAC. The effective permission, not the granted permission, is what an attacker exploits.",
|
|
660
|
+
"last_verified": "2026-05-11"
|
|
661
|
+
},
|
|
662
|
+
"CWE-345": {
|
|
663
|
+
"id": "CWE-345",
|
|
664
|
+
"name": "Insufficient Verification of Data Authenticity",
|
|
665
|
+
"abstraction": "Class",
|
|
666
|
+
"category": "Authenticity / Supply Chain",
|
|
667
|
+
"description": "The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. Canonical class for supply-chain compromise where a malicious model, plugin, or dependency is loaded because its provenance was not verified.",
|
|
668
|
+
"top_25_rank_2024": null,
|
|
669
|
+
"top_25_rank_2025": null,
|
|
670
|
+
"view_memberships": [
|
|
671
|
+
"CWE-1000"
|
|
672
|
+
],
|
|
673
|
+
"related_attack_patterns_capec": [
|
|
674
|
+
"CAPEC-141",
|
|
675
|
+
"CAPEC-148"
|
|
676
|
+
],
|
|
677
|
+
"skills_referencing": [
|
|
678
|
+
"mcp-agent-trust",
|
|
679
|
+
"ai-attack-surface"
|
|
680
|
+
],
|
|
681
|
+
"evidence_cves": [
|
|
682
|
+
"CVE-2026-30615"
|
|
683
|
+
],
|
|
684
|
+
"framework_controls_partially_addressing": [
|
|
685
|
+
"NIST-800-53-SA-12",
|
|
686
|
+
"NIST-800-53-SI-7",
|
|
687
|
+
"ISO-27001-2022-A.8.30"
|
|
688
|
+
],
|
|
689
|
+
"real_requirement": "Sigstore / cosign signature verification on all model and MCP plugin loads; SLSA Level 3+ provenance attestation; transparency-log inclusion proof checked at install time. Hash-pinning alone is insufficient if the publishing key is compromised.",
|
|
690
|
+
"lag_notes": "SA-12 supply chain risk management does not mandate cryptographic provenance verification for AI artifacts (models, MCP servers, agent plugins). Treated as 'vendor management' rather than 'authentication.'",
|
|
691
|
+
"last_verified": "2026-05-11"
|
|
692
|
+
},
|
|
693
|
+
"CWE-494": {
|
|
694
|
+
"id": "CWE-494",
|
|
695
|
+
"name": "Download of Code Without Integrity Check",
|
|
696
|
+
"abstraction": "Base",
|
|
697
|
+
"category": "Supply Chain",
|
|
698
|
+
"description": "The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.",
|
|
699
|
+
"top_25_rank_2024": null,
|
|
700
|
+
"top_25_rank_2025": null,
|
|
701
|
+
"view_memberships": [
|
|
702
|
+
"CWE-1000"
|
|
703
|
+
],
|
|
704
|
+
"related_attack_patterns_capec": [
|
|
705
|
+
"CAPEC-185"
|
|
706
|
+
],
|
|
707
|
+
"skills_referencing": [
|
|
708
|
+
"mcp-agent-trust",
|
|
709
|
+
"ai-attack-surface"
|
|
710
|
+
],
|
|
711
|
+
"evidence_cves": [
|
|
712
|
+
"CVE-2026-30615"
|
|
713
|
+
],
|
|
714
|
+
"framework_controls_partially_addressing": [
|
|
715
|
+
"NIST-800-53-SI-7",
|
|
716
|
+
"NIST-800-53-SA-12",
|
|
717
|
+
"ISO-27001-2022-A.8.30"
|
|
718
|
+
],
|
|
719
|
+
"real_requirement": "All package, model, and plugin installs require signature verification against pinned publishing keys; key rotation procedures published and monitored; package-registry typosquat scanning for AI and MCP ecosystems specifically (PyPI, npm, HuggingFace, MCP registries).",
|
|
720
|
+
"lag_notes": "SI-7 covers software integrity but does not specifically address developer-installed AI tooling (MCP servers, VS Code AI extensions) as a high-trust class. Windsurf MCP RCE (CVE-2026-30615) is a CWE-494 instance reachable because developer tooling installs bypass enterprise package-integrity controls.",
|
|
721
|
+
"last_verified": "2026-05-11"
|
|
722
|
+
},
|
|
723
|
+
"CWE-829": {
|
|
724
|
+
"id": "CWE-829",
|
|
725
|
+
"name": "Inclusion of Functionality from Untrusted Control Sphere",
|
|
726
|
+
"abstraction": "Class",
|
|
727
|
+
"category": "Supply Chain",
|
|
728
|
+
"description": "The product imports, requires, or includes executable functionality from a source that is outside of the intended control sphere.",
|
|
729
|
+
"top_25_rank_2024": null,
|
|
730
|
+
"top_25_rank_2025": null,
|
|
731
|
+
"view_memberships": [
|
|
732
|
+
"CWE-1000"
|
|
733
|
+
],
|
|
734
|
+
"related_attack_patterns_capec": [
|
|
735
|
+
"CAPEC-538"
|
|
736
|
+
],
|
|
737
|
+
"skills_referencing": [
|
|
738
|
+
"mcp-agent-trust",
|
|
739
|
+
"rag-pipeline-security"
|
|
740
|
+
],
|
|
741
|
+
"evidence_cves": [],
|
|
742
|
+
"framework_controls_partially_addressing": [
|
|
743
|
+
"NIST-800-53-SA-12",
|
|
744
|
+
"ISO-27001-2022-A.8.30"
|
|
745
|
+
],
|
|
746
|
+
"real_requirement": "Allowlist of approved MCP server publishers; private package registry mirrors for enterprise; CI-time scanning for newly-included dependencies (including transitive); for AI agents, allowlist of tool sources distinct from the agent's general internet access.",
|
|
747
|
+
"lag_notes": "SA-12 evaluates suppliers; CWE-829 occurs at runtime when an agent or developer adds a dependency post-evaluation. No framework requires runtime dependency-introduction review for AI tooling.",
|
|
748
|
+
"last_verified": "2026-05-11"
|
|
749
|
+
},
|
|
750
|
+
"CWE-1357": {
|
|
751
|
+
"id": "CWE-1357",
|
|
752
|
+
"name": "Reliance on Insufficiently Trustworthy Component",
|
|
753
|
+
"abstraction": "Class",
|
|
754
|
+
"category": "Supply Chain",
|
|
755
|
+
"description": "The product is built from multiple separate components, but it uses a component that is not sufficiently trusted to meet expectations for security, reliability, updateability, and maintainability.",
|
|
756
|
+
"top_25_rank_2024": null,
|
|
757
|
+
"top_25_rank_2025": null,
|
|
758
|
+
"view_memberships": [
|
|
759
|
+
"CWE-1000"
|
|
760
|
+
],
|
|
761
|
+
"related_attack_patterns_capec": [],
|
|
762
|
+
"skills_referencing": [
|
|
763
|
+
"mcp-agent-trust"
|
|
764
|
+
],
|
|
765
|
+
"evidence_cves": [],
|
|
766
|
+
"framework_controls_partially_addressing": [
|
|
767
|
+
"NIST-800-53-SA-12",
|
|
768
|
+
"ISO-27001-2022-A.5.21",
|
|
769
|
+
"ISO-27001-2022-A.8.30"
|
|
770
|
+
],
|
|
771
|
+
"real_requirement": "Tiered trust assessment for components based on blast radius (kernel module vs. CLI lint plugin); periodic re-evaluation of trust as a function of maintainer responsiveness, signing-key hygiene, and CVE history; SBOM-tracked component criticality scoring.",
|
|
772
|
+
"lag_notes": "SA-12 treats supplier trust as a procurement-time decision. CWE-1357 requires continuous re-evaluation as maintainer behavior changes (key compromise, sale of package, abandonment).",
|
|
773
|
+
"last_verified": "2026-05-11"
|
|
774
|
+
},
|
|
775
|
+
"CWE-1395": {
|
|
776
|
+
"id": "CWE-1395",
|
|
777
|
+
"name": "Dependency on Vulnerable Third-Party Component",
|
|
778
|
+
"abstraction": "Class",
|
|
779
|
+
"category": "Supply Chain",
|
|
780
|
+
"description": "The product has a dependency on a third-party component that contains one or more known vulnerabilities.",
|
|
781
|
+
"top_25_rank_2024": null,
|
|
782
|
+
"top_25_rank_2025": null,
|
|
783
|
+
"view_memberships": [
|
|
784
|
+
"CWE-1000",
|
|
785
|
+
"CWE-1425"
|
|
786
|
+
],
|
|
787
|
+
"related_attack_patterns_capec": [],
|
|
788
|
+
"skills_referencing": [
|
|
789
|
+
"mcp-agent-trust",
|
|
790
|
+
"ai-attack-surface"
|
|
791
|
+
],
|
|
792
|
+
"evidence_cves": [],
|
|
793
|
+
"framework_controls_partially_addressing": [
|
|
794
|
+
"NIST-800-53-SA-12",
|
|
795
|
+
"NIST-800-53-SI-2",
|
|
796
|
+
"ISO-27001-2022-A.8.8",
|
|
797
|
+
"ISO-27001-2022-A.8.30"
|
|
798
|
+
],
|
|
799
|
+
"real_requirement": "SBOM plus continuous VEX-aware vulnerability matching; reachability analysis (is the vulnerable code path actually invoked?); for AI: HuggingFace, npm, PyPI model and plugin dependency CVE tracking with the same SLA as first-party code.",
|
|
800
|
+
"lag_notes": "SI-2 patch SLAs apply to first-party software; for transitive dependencies (especially Python ML stack), patching depends on upstream maintainer response. Reachability gating is not required by any framework.",
|
|
801
|
+
"last_verified": "2026-05-11"
|
|
802
|
+
},
|
|
803
|
+
"CWE-1426": {
|
|
804
|
+
"id": "CWE-1426",
|
|
805
|
+
"name": "Improper Validation of Generative AI Output",
|
|
806
|
+
"abstraction": "Base",
|
|
807
|
+
"category": "AI/ML",
|
|
808
|
+
"description": "The product invokes a generative AI / large language model (LLM) and does not validate or insufficiently validates the outputs to ensure they align with the intended security, content, or privacy policy.",
|
|
809
|
+
"top_25_rank_2024": null,
|
|
810
|
+
"top_25_rank_2025": null,
|
|
811
|
+
"view_memberships": [
|
|
812
|
+
"CWE-1000",
|
|
813
|
+
"CWE-1425"
|
|
814
|
+
],
|
|
815
|
+
"related_attack_patterns_capec": [],
|
|
816
|
+
"skills_referencing": [
|
|
817
|
+
"ai-attack-surface",
|
|
818
|
+
"rag-pipeline-security",
|
|
819
|
+
"ai-c2-detection",
|
|
820
|
+
"mcp-agent-trust"
|
|
821
|
+
],
|
|
822
|
+
"evidence_cves": [],
|
|
823
|
+
"framework_controls_partially_addressing": [
|
|
824
|
+
"NIST-AI-RMF-MEASURE-2.5",
|
|
825
|
+
"NIST-AI-RMF-MEASURE-2.7",
|
|
826
|
+
"ISO-27001-2022-A.8.28"
|
|
827
|
+
],
|
|
828
|
+
"real_requirement": "Output validation pipelines that match the action class of the output: tool-call outputs require argv allowlist plus capability scoping; code outputs require sandbox execution plus static analysis; natural-language outputs to users require PII and secret redaction. For high-impact actions, human-in-the-loop confirmation. Validation must be on the output channel, not (only) on the input.",
|
|
829
|
+
"lag_notes": "NIST AI RMF MEASURE 2.5 (validity and reliability) treats AI output quality as a model-evaluation problem (accuracy metrics). It does not treat malicious output (jailbroken code, exfiltration, harmful content) as a CWE class requiring output-side controls.",
|
|
830
|
+
"last_verified": "2026-05-11"
|
|
831
|
+
},
|
|
832
|
+
"CWE-1039": {
|
|
833
|
+
"id": "CWE-1039",
|
|
834
|
+
"name": "Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations",
|
|
835
|
+
"abstraction": "Base",
|
|
836
|
+
"category": "AI/ML",
|
|
837
|
+
"description": "The product uses an automated mechanism such as machine learning to recognize complex data inputs but it does not adequately detect or handle inputs that have been crafted to cause the mechanism to misclassify or otherwise produce an incorrect result.",
|
|
838
|
+
"top_25_rank_2024": null,
|
|
839
|
+
"top_25_rank_2025": null,
|
|
840
|
+
"view_memberships": [
|
|
841
|
+
"CWE-1000",
|
|
842
|
+
"CWE-1425"
|
|
843
|
+
],
|
|
844
|
+
"related_attack_patterns_capec": [],
|
|
845
|
+
"skills_referencing": [
|
|
846
|
+
"ai-attack-surface"
|
|
847
|
+
],
|
|
848
|
+
"evidence_cves": [],
|
|
849
|
+
"framework_controls_partially_addressing": [
|
|
850
|
+
"NIST-AI-RMF-MEASURE-2.5",
|
|
851
|
+
"NIST-AI-RMF-MEASURE-2.7"
|
|
852
|
+
],
|
|
853
|
+
"real_requirement": "Adversarial robustness testing in the model evaluation lifecycle (FGSM, PGD, transfer attacks); confidence calibration on out-of-distribution inputs; out-of-band human review for high-stakes classifications (biometric auth, fraud).",
|
|
854
|
+
"lag_notes": "Adversarial robustness testing is not required by any compliance framework. Maps to ATLAS AML.T0043 (Craft Adversarial Data), for which the framework_gap is true.",
|
|
855
|
+
"last_verified": "2026-05-11"
|
|
856
|
+
},
|
|
857
|
+
"CWE-1037": {
|
|
858
|
+
"id": "CWE-1037",
|
|
859
|
+
"name": "Processor Optimization Removal or Modification of Security-critical Code",
|
|
860
|
+
"abstraction": "Base",
|
|
861
|
+
"category": "Hardware / Side Channel",
|
|
862
|
+
"description": "The developer builds a security-critical protection mechanism into the software, but the processor optimizes the execution of the program such that the mechanism is removed or modified. Canonical class for Spectre/Meltdown-family speculative-execution side channels.",
|
|
863
|
+
"top_25_rank_2024": null,
|
|
864
|
+
"top_25_rank_2025": null,
|
|
865
|
+
"view_memberships": [
|
|
866
|
+
"CWE-1000"
|
|
867
|
+
],
|
|
868
|
+
"related_attack_patterns_capec": [],
|
|
869
|
+
"skills_referencing": [
|
|
870
|
+
"pqc-first"
|
|
871
|
+
],
|
|
872
|
+
"evidence_cves": [],
|
|
873
|
+
"framework_controls_partially_addressing": [
|
|
874
|
+
"NIST-800-53-SI-16",
|
|
875
|
+
"ISO-27001-2022-A.8.28"
|
|
876
|
+
],
|
|
877
|
+
"real_requirement": "Retpoline / IBRS / hardware mitigations enabled; constant-time cryptographic implementations verified post-compile; site-isolation in browsers; speculative-execution-aware compiler hardening for cryptographic code paths.",
|
|
878
|
+
"lag_notes": "Microarchitectural side channels are not addressed by any framework control. SI-16 (memory protection) is satisfied by software-level NX/ASLR and does not contemplate the CPU as the attacker.",
|
|
879
|
+
"last_verified": "2026-05-11"
|
|
880
|
+
},
|
|
881
|
+
"CWE-327": {
|
|
882
|
+
"id": "CWE-327",
|
|
883
|
+
"name": "Use of a Broken or Risky Cryptographic Algorithm",
|
|
884
|
+
"abstraction": "Class",
|
|
885
|
+
"category": "Cryptography",
|
|
886
|
+
"description": "The product uses a broken or risky cryptographic algorithm or protocol. Maps directly to the post-quantum-cryptography transition risk: classical asymmetric algorithms (RSA, ECDSA, ECDH) become risky once a cryptographically-relevant quantum computer exists, and 'harvest now, decrypt later' attacks make CWE-327 a present-tense risk for long-lived data.",
|
|
887
|
+
"top_25_rank_2024": null,
|
|
888
|
+
"top_25_rank_2025": null,
|
|
889
|
+
"view_memberships": [
|
|
890
|
+
"CWE-1003",
|
|
891
|
+
"CWE-1000"
|
|
892
|
+
],
|
|
893
|
+
"related_attack_patterns_capec": [
|
|
894
|
+
"CAPEC-97"
|
|
895
|
+
],
|
|
896
|
+
"skills_referencing": [
|
|
897
|
+
"pqc-first"
|
|
898
|
+
],
|
|
899
|
+
"evidence_cves": [],
|
|
900
|
+
"framework_controls_partially_addressing": [
|
|
901
|
+
"NIST-800-53-SC-13",
|
|
902
|
+
"ISO-27001-2022-A.8.24"
|
|
903
|
+
],
|
|
904
|
+
"real_requirement": "Crypto-agile design (algorithm selection via configuration, not hardcoded); migration plan to NIST PQC standards (ML-KEM / FIPS-203, ML-DSA / FIPS-204, SLH-DSA / FIPS-205) on a published timeline; hybrid classical-plus-PQC for transition period; inventory of long-lived encrypted data subject to harvest-now-decrypt-later.",
|
|
905
|
+
"lag_notes": "SC-13 'cryptographic protection' lists approved algorithms but the transition timeline for deprecating classical asymmetric crypto is not enforced. ISO-27001 A.8.24 (use of cryptography) does not require crypto-agility.",
|
|
906
|
+
"last_verified": "2026-05-11"
|
|
907
|
+
},
|
|
908
|
+
"CWE-798": {
|
|
909
|
+
"id": "CWE-798",
|
|
910
|
+
"name": "Use of Hard-coded Credentials",
|
|
911
|
+
"abstraction": "Base",
|
|
912
|
+
"category": "Credentials",
|
|
913
|
+
"description": "The product contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. LLM-generated code is a documented re-introduction vector for hardcoded credentials.",
|
|
914
|
+
"top_25_rank_2024": 18,
|
|
915
|
+
"top_25_rank_2025": null,
|
|
916
|
+
"view_memberships": [
|
|
917
|
+
"CWE-1003",
|
|
918
|
+
"CWE-1000",
|
|
919
|
+
"CWE-1430"
|
|
920
|
+
],
|
|
921
|
+
"related_attack_patterns_capec": [
|
|
922
|
+
"CAPEC-191"
|
|
923
|
+
],
|
|
924
|
+
"skills_referencing": [
|
|
925
|
+
"ai-attack-surface"
|
|
926
|
+
],
|
|
927
|
+
"evidence_cves": [],
|
|
928
|
+
"framework_controls_partially_addressing": [
|
|
929
|
+
"NIST-800-53-IA-5",
|
|
930
|
+
"ISO-27001-2022-A.8.5"
|
|
931
|
+
],
|
|
932
|
+
"real_requirement": "Secret-scanning in pre-commit and CI with deny-merge on detection; secret manager (HashiCorp Vault, AWS Secrets Manager, etc.) for runtime retrieval; LLM-generated-code-specific scanners that detect placeholder-credential patterns that the model emits.",
|
|
933
|
+
"lag_notes": "DR-5: LLM-generated code routinely contains placeholder credentials and sometimes real credentials from training data. No framework treats LLM code emission as a CWE-798 vector.",
|
|
934
|
+
"last_verified": "2026-05-11"
|
|
935
|
+
},
|
|
936
|
+
"CWE-306": {
|
|
937
|
+
"id": "CWE-306",
|
|
938
|
+
"name": "Missing Authentication for Critical Function",
|
|
939
|
+
"abstraction": "Base",
|
|
940
|
+
"category": "Authentication",
|
|
941
|
+
"description": "The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.",
|
|
942
|
+
"top_25_rank_2024": 20,
|
|
943
|
+
"top_25_rank_2025": null,
|
|
944
|
+
"view_memberships": [
|
|
945
|
+
"CWE-1003",
|
|
946
|
+
"CWE-1000",
|
|
947
|
+
"CWE-1430"
|
|
948
|
+
],
|
|
949
|
+
"related_attack_patterns_capec": [
|
|
950
|
+
"CAPEC-115"
|
|
951
|
+
],
|
|
952
|
+
"skills_referencing": [
|
|
953
|
+
"mcp-agent-trust"
|
|
954
|
+
],
|
|
955
|
+
"evidence_cves": [],
|
|
956
|
+
"framework_controls_partially_addressing": [
|
|
957
|
+
"NIST-800-53-IA-2",
|
|
958
|
+
"ISO-27001-2022-A.5.17"
|
|
959
|
+
],
|
|
960
|
+
"real_requirement": "Default-deny on all admin, internal, and MCP endpoints; pre-deployment authentication audit of every newly-exposed endpoint; for MCP servers, required client authentication (mTLS or signed token) even on localhost transports.",
|
|
961
|
+
"lag_notes": "MCP servers on localhost or stdio transports are often unauthenticated by default — the trust boundary is assumed to be the host. CWE-306 applies when a malicious local process or compromised editor exploits this assumption.",
|
|
962
|
+
"last_verified": "2026-05-11"
|
|
963
|
+
},
|
|
964
|
+
"CWE-362": {
|
|
965
|
+
"id": "CWE-362",
|
|
966
|
+
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
967
|
+
"abstraction": "Class",
|
|
968
|
+
"category": "Concurrency",
|
|
969
|
+
"description": "The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.",
|
|
970
|
+
"top_25_rank_2024": 21,
|
|
971
|
+
"top_25_rank_2025": null,
|
|
972
|
+
"view_memberships": [
|
|
973
|
+
"CWE-1003",
|
|
974
|
+
"CWE-1000",
|
|
975
|
+
"CWE-1430"
|
|
976
|
+
],
|
|
977
|
+
"related_attack_patterns_capec": [
|
|
978
|
+
"CAPEC-29"
|
|
979
|
+
],
|
|
980
|
+
"skills_referencing": [
|
|
981
|
+
"kernel-lpe-triage"
|
|
982
|
+
],
|
|
983
|
+
"evidence_cves": [],
|
|
984
|
+
"framework_controls_partially_addressing": [
|
|
985
|
+
"NIST-800-53-SI-16",
|
|
986
|
+
"ISO-27001-2022-A.8.28"
|
|
987
|
+
],
|
|
988
|
+
"real_requirement": "Static race detection in CI (Rust Send/Sync, TSan); kernel-specific race detection (KCSAN); replace racy primitives with lock-free or RCU patterns where contention is high. CVSS routinely under-scores race conditions; many become deterministic with AI-assisted timing analysis.",
|
|
989
|
+
"lag_notes": "DR-5: AI-assisted timing analysis reduces race exploitation from days to minutes. CVSS attack-complexity-high assumption (race conditions are 'hard') is increasingly invalid.",
|
|
990
|
+
"last_verified": "2026-05-11"
|
|
991
|
+
},
|
|
992
|
+
"CWE-1188": {
|
|
993
|
+
"id": "CWE-1188",
|
|
994
|
+
"name": "Initialization of a Resource with an Insecure Default",
|
|
995
|
+
"abstraction": "Base",
|
|
996
|
+
"category": "Configuration",
|
|
997
|
+
"description": "The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.",
|
|
998
|
+
"top_25_rank_2024": null,
|
|
999
|
+
"top_25_rank_2025": null,
|
|
1000
|
+
"view_memberships": [
|
|
1001
|
+
"CWE-1000"
|
|
1002
|
+
],
|
|
1003
|
+
"related_attack_patterns_capec": [],
|
|
1004
|
+
"skills_referencing": [
|
|
1005
|
+
"mcp-agent-trust",
|
|
1006
|
+
"security-maturity-tiers"
|
|
1007
|
+
],
|
|
1008
|
+
"evidence_cves": [],
|
|
1009
|
+
"framework_controls_partially_addressing": [
|
|
1010
|
+
"NIST-800-53-CM-6",
|
|
1011
|
+
"ISO-27001-2022-A.8.9"
|
|
1012
|
+
],
|
|
1013
|
+
"real_requirement": "Secure-by-default configurations shipped; insecure modes require explicit opt-in with a documented risk acknowledgment; for MCP servers, default to no-network, no-fs, requiring explicit capability grants.",
|
|
1014
|
+
"lag_notes": "CM-6 baseline configuration is set per-deployment; CWE-1188 is about the shipped default. Frameworks rarely audit product defaults — they audit organizational deployment.",
|
|
1015
|
+
"last_verified": "2026-05-11"
|
|
1016
|
+
}
|
|
1017
|
+
}
|