@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
|
@@ -0,0 +1,1255 @@
|
|
|
1
|
+
{
|
|
2
|
+
"_meta": {
|
|
3
|
+
"schema_version": "1.0.0",
|
|
4
|
+
"last_updated": "2026-05-01",
|
|
5
|
+
"note": "status: open = gap still exists. status: closed = framework update closed the gap. Never delete entries — preserve gap history.",
|
|
6
|
+
"tlp": "CLEAR",
|
|
7
|
+
"source_confidence": {
|
|
8
|
+
"scheme": "Admiralty (A-F + 1-6)",
|
|
9
|
+
"default": "A1",
|
|
10
|
+
"note": "B = usually reliable; 2 = probably true. Per-entry overrides via entry-level source_confidence field. Public-record catalogs (NVD, ATLAS, CWE, RFC, framework publishers) get A1 (completely reliable, confirmed). Project-curated catalogs (zeroday-lessons, exploit-availability) default to B2 with source citations."
|
|
11
|
+
},
|
|
12
|
+
"freshness_policy": {
|
|
13
|
+
"default_review_cadence_days": 90,
|
|
14
|
+
"stale_after_days": 180,
|
|
15
|
+
"rebuild_after_days": 365,
|
|
16
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
17
|
+
}
|
|
18
|
+
},
|
|
19
|
+
"NIST-800-53-SI-2": {
|
|
20
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
21
|
+
"control_id": "SI-2",
|
|
22
|
+
"control_name": "Flaw Remediation",
|
|
23
|
+
"designed_for": "Network-centric environments with human-speed exploit development. Original 2013 context; Rev 5 2020. Assumes organizationally-defined time periods are a meaningful security window.",
|
|
24
|
+
"misses": [
|
|
25
|
+
"Deterministic LPEs with no race condition — 'timely' is not operationalized for instant-root exploits",
|
|
26
|
+
"CISA KEV class: confirmed exploitation requires incident-speed response, not patch-cycle response",
|
|
27
|
+
"AI-assisted weaponization compressing time-to-reliable-exploit from weeks to hours",
|
|
28
|
+
"Live kernel patching as a required capability for systems that cannot tolerate reboots"
|
|
29
|
+
],
|
|
30
|
+
"real_requirement": "Tiered SLA: CISA KEV + public PoC = 4h to live-patch or isolate. Public PoC (no KEV) = 24h. Critical (no public PoC) = 72h. High = 7 days. Live patching capability required for production systems that cannot reboot.",
|
|
31
|
+
"status": "open",
|
|
32
|
+
"opened_date": "2026-03-15",
|
|
33
|
+
"evidence_cves": [
|
|
34
|
+
"CVE-2026-31431",
|
|
35
|
+
"CVE-2026-43284"
|
|
36
|
+
],
|
|
37
|
+
"atlas_refs": [],
|
|
38
|
+
"attack_refs": [
|
|
39
|
+
"T1068"
|
|
40
|
+
]
|
|
41
|
+
},
|
|
42
|
+
"NIST-800-53-SC-8": {
|
|
43
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
44
|
+
"control_id": "SC-8",
|
|
45
|
+
"control_name": "Transmission Confidentiality and Integrity",
|
|
46
|
+
"designed_for": "Cryptographic protection of data in transit via standard protocols (TLS, IPsec, etc.)",
|
|
47
|
+
"misses": [
|
|
48
|
+
"Dirty Frag (CVE-2026-43284) exploits the IPsec implementation itself — IPsec-based SC-8 compliance is not a compensating control when IPsec is the attack surface",
|
|
49
|
+
"No requirement for cryptographic subsystem integrity monitoring"
|
|
50
|
+
],
|
|
51
|
+
"real_requirement": "SC-8 compliance evidence must note when kernel CVEs affecting the cryptographic subsystem are unpatched. IPsec-based controls cannot be claimed as compensating controls for CVEs affecting the IPsec kernel implementation.",
|
|
52
|
+
"status": "open",
|
|
53
|
+
"opened_date": "2026-04-01",
|
|
54
|
+
"evidence_cves": [
|
|
55
|
+
"CVE-2026-43284",
|
|
56
|
+
"CVE-2026-43500"
|
|
57
|
+
],
|
|
58
|
+
"atlas_refs": [],
|
|
59
|
+
"attack_refs": [
|
|
60
|
+
"T1068"
|
|
61
|
+
]
|
|
62
|
+
},
|
|
63
|
+
"NIST-800-53-AC-2": {
|
|
64
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
65
|
+
"control_id": "AC-2",
|
|
66
|
+
"control_name": "Account Management",
|
|
67
|
+
"designed_for": "Human user accounts, service accounts, machine identities in traditional IAM systems",
|
|
68
|
+
"misses": [
|
|
69
|
+
"AI agent identity: AI agents act with service account credentials but decisions are made by the model, not the account holder",
|
|
70
|
+
"Prompt injection as access control bypass: injected instructions cause AI to take actions using its authorized service account — the access is authorized from AC-2's perspective",
|
|
71
|
+
"No mechanism for session-level or invocation-level authorization for AI agent actions",
|
|
72
|
+
"Audit trails show the service account, not the adversary who injected the prompt"
|
|
73
|
+
],
|
|
74
|
+
"real_requirement": "Agent identity controls: each AI agent invocation requires an authorization context (who initiated it, what actions are permitted for this session, what tools are authorized). Prompt-level access control separate from account-level access control.",
|
|
75
|
+
"status": "open",
|
|
76
|
+
"opened_date": "2026-03-01",
|
|
77
|
+
"evidence_cves": [
|
|
78
|
+
"CVE-2025-53773"
|
|
79
|
+
],
|
|
80
|
+
"atlas_refs": [
|
|
81
|
+
"AML.T0051",
|
|
82
|
+
"AML.T0054"
|
|
83
|
+
],
|
|
84
|
+
"attack_refs": [
|
|
85
|
+
"T1059"
|
|
86
|
+
]
|
|
87
|
+
},
|
|
88
|
+
"NIST-800-53-SI-3": {
|
|
89
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
90
|
+
"control_id": "SI-3",
|
|
91
|
+
"control_name": "Malicious Code Protection",
|
|
92
|
+
"designed_for": "Signature-based and behavioral malware detection for known malware families",
|
|
93
|
+
"misses": [
|
|
94
|
+
"PROMPTFLUX generates unique evasion code per execution by querying public LLMs — no signature exists because every sample is novel",
|
|
95
|
+
"AI-generated malware evasion is dynamically updated per detection event",
|
|
96
|
+
"LLM query by malware process is not a recognized detection indicator in SI-3 implementations"
|
|
97
|
+
],
|
|
98
|
+
"real_requirement": "Malware protection must include: detection of AI API queries from unexpected processes (PROMPTFLUX indicator), behavioral analysis that doesn't rely solely on static signatures, LLM query monitoring as a security telemetry source.",
|
|
99
|
+
"status": "open",
|
|
100
|
+
"opened_date": "2026-02-01",
|
|
101
|
+
"evidence_cves": [],
|
|
102
|
+
"atlas_refs": [
|
|
103
|
+
"AML.T0017"
|
|
104
|
+
],
|
|
105
|
+
"attack_refs": [
|
|
106
|
+
"T1059"
|
|
107
|
+
]
|
|
108
|
+
},
|
|
109
|
+
"NIST-800-53-SA-12": {
|
|
110
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
111
|
+
"control_id": "SA-12",
|
|
112
|
+
"control_name": "Supply Chain Protection",
|
|
113
|
+
"designed_for": "Software procurement, vendor management, and supplier risk in enterprise environments",
|
|
114
|
+
"misses": [
|
|
115
|
+
"MCP server supply chain: developer-installed AI tool plugins are not covered by enterprise procurement controls",
|
|
116
|
+
"MCP server packages execute code on behalf of AI models — higher risk than traditional npm packages",
|
|
117
|
+
"No control for unsigned MCP server manifests or tool allowlisting",
|
|
118
|
+
"Supply chain risk for AI tool ecosystems is a new category not anticipated by SA-12"
|
|
119
|
+
],
|
|
120
|
+
"real_requirement": "SA-12 scope must include AI tool plugins (MCP servers, VS Code extensions with AI capability). MCP servers require: signed manifests, tool allowlisting, organizational approved-registry, vendor review equivalent to critical third-party software.",
|
|
121
|
+
"status": "open",
|
|
122
|
+
"opened_date": "2026-04-01",
|
|
123
|
+
"evidence_cves": [
|
|
124
|
+
"CVE-2026-30615"
|
|
125
|
+
],
|
|
126
|
+
"atlas_refs": [
|
|
127
|
+
"AML.T0010"
|
|
128
|
+
],
|
|
129
|
+
"attack_refs": [
|
|
130
|
+
"T1195.001"
|
|
131
|
+
]
|
|
132
|
+
},
|
|
133
|
+
"ISO-27001-2022-A.8.8": {
|
|
134
|
+
"framework": "ISO/IEC 27001:2022",
|
|
135
|
+
"control_id": "A.8.8",
|
|
136
|
+
"control_name": "Management of technical vulnerabilities",
|
|
137
|
+
"designed_for": "Systematic patch management with timelines based on risk classification",
|
|
138
|
+
"misses": [
|
|
139
|
+
"'Appropriate timescales' is undefined — interpreted as 30 days for Critical, 90 days for Medium in most implementations",
|
|
140
|
+
"No requirement for live kernel patching capability",
|
|
141
|
+
"No CISA KEV-aware response category",
|
|
142
|
+
"Timescales designed for human-speed exploit development"
|
|
143
|
+
],
|
|
144
|
+
"real_requirement": "A.8.8 must be implemented with timescales indexed to: CISA KEV status (hours), PoC availability (24h), criticality class (72h). Live patching capability documented as required for production systems.",
|
|
145
|
+
"status": "open",
|
|
146
|
+
"opened_date": "2026-03-15",
|
|
147
|
+
"evidence_cves": [
|
|
148
|
+
"CVE-2026-31431"
|
|
149
|
+
],
|
|
150
|
+
"atlas_refs": [],
|
|
151
|
+
"attack_refs": [
|
|
152
|
+
"T1068"
|
|
153
|
+
]
|
|
154
|
+
},
|
|
155
|
+
"ISO-27001-2022-A.8.28": {
|
|
156
|
+
"framework": "ISO/IEC 27001:2022",
|
|
157
|
+
"control_id": "A.8.28",
|
|
158
|
+
"control_name": "Secure coding",
|
|
159
|
+
"designed_for": "Secure development practices: SAST, DAST, code review, secure libraries",
|
|
160
|
+
"misses": [
|
|
161
|
+
"No AI/ML system security requirements",
|
|
162
|
+
"No prompt injection coverage — prompt injection is a semantic vulnerability, not a code vulnerability",
|
|
163
|
+
"No model integrity verification requirements",
|
|
164
|
+
"RAG pipeline security is outside the scope of 'secure coding'"
|
|
165
|
+
],
|
|
166
|
+
"real_requirement": "Separate AI system security controls are needed: prompt injection testing, model integrity verification, training pipeline security, RAG pipeline security. A.8.28 is not the right control family for AI system security.",
|
|
167
|
+
"status": "open",
|
|
168
|
+
"opened_date": "2026-01-01",
|
|
169
|
+
"evidence_cves": [
|
|
170
|
+
"CVE-2025-53773"
|
|
171
|
+
],
|
|
172
|
+
"atlas_refs": [
|
|
173
|
+
"AML.T0051",
|
|
174
|
+
"AML.T0054"
|
|
175
|
+
],
|
|
176
|
+
"attack_refs": []
|
|
177
|
+
},
|
|
178
|
+
"SOC2-CC6-logical-access": {
|
|
179
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
180
|
+
"control_id": "CC6",
|
|
181
|
+
"control_name": "Logical and Physical Access Controls",
|
|
182
|
+
"designed_for": "Authentication, authorization, and access controls for human users and service accounts",
|
|
183
|
+
"misses": [
|
|
184
|
+
"Prompt injection bypasses logical access: the AI agent's service account is properly authorized; the injected instructions route around CC6 entirely",
|
|
185
|
+
"Audit evidence for CC6 shows authorized service account activity — attacker identity is absent from all access logs",
|
|
186
|
+
"No control for AI agent session-level authorization distinct from service account authorization"
|
|
187
|
+
],
|
|
188
|
+
"real_requirement": "CC6 requires supplementation with: AI agent invocation authorization (what is this specific model run permitted to do?), prompt logging for post-incident analysis, anomaly detection on AI agent actions.",
|
|
189
|
+
"status": "open",
|
|
190
|
+
"opened_date": "2026-03-01",
|
|
191
|
+
"evidence_cves": [
|
|
192
|
+
"CVE-2025-53773"
|
|
193
|
+
],
|
|
194
|
+
"atlas_refs": [
|
|
195
|
+
"AML.T0051"
|
|
196
|
+
],
|
|
197
|
+
"attack_refs": []
|
|
198
|
+
},
|
|
199
|
+
"PCI-DSS-4.0-6.3.3": {
|
|
200
|
+
"framework": "PCI DSS 4.0",
|
|
201
|
+
"control_id": "6.3.3",
|
|
202
|
+
"control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates",
|
|
203
|
+
"designed_for": "Critical patches within 1 month; other patches within 3 months. Designed for 2004-era exploit development timelines.",
|
|
204
|
+
"misses": [
|
|
205
|
+
"1-month critical patch window is an exploitation acceptance window for CISA KEV + public PoC",
|
|
206
|
+
"No live-patch requirement for PCI-scoped systems",
|
|
207
|
+
"No CISA KEV-specific response category",
|
|
208
|
+
"AI-accelerated exploit development breaks the assumption that 1 month is a safety window"
|
|
209
|
+
],
|
|
210
|
+
"real_requirement": "PCI scoping must include a CISA KEV-specific response tier: < 72h remediation (live patch or documented compensating controls). 1-month window retains applicability only for vulnerabilities with no public PoC and no active exploitation.",
|
|
211
|
+
"status": "open",
|
|
212
|
+
"opened_date": "2026-03-15",
|
|
213
|
+
"evidence_cves": [
|
|
214
|
+
"CVE-2026-31431"
|
|
215
|
+
],
|
|
216
|
+
"atlas_refs": [],
|
|
217
|
+
"attack_refs": [
|
|
218
|
+
"T1068"
|
|
219
|
+
]
|
|
220
|
+
},
|
|
221
|
+
"ALL-AI-PIPELINE-INTEGRITY": {
|
|
222
|
+
"framework": "ALL",
|
|
223
|
+
"control_id": "UNIVERSAL-GAP-001",
|
|
224
|
+
"control_name": "AI Pipeline Integrity",
|
|
225
|
+
"designed_for": "N/A — no framework has this control",
|
|
226
|
+
"misses": [
|
|
227
|
+
"Model versioning and change control for externally managed LLMs",
|
|
228
|
+
"Behavioral regression testing after model updates",
|
|
229
|
+
"Training pipeline integrity and poisoning detection",
|
|
230
|
+
"Model fingerprinting for unauthorized change detection",
|
|
231
|
+
"Output monitoring for safety-relevant behavioral changes"
|
|
232
|
+
],
|
|
233
|
+
"real_requirement": "AI pipeline integrity controls: (1) model version pinning where API supports it, (2) behavioral test suite with regression alerting, (3) provider changelog monitoring, (4) training pipeline SLSA-equivalent supply chain attestation for self-hosted models.",
|
|
234
|
+
"status": "open",
|
|
235
|
+
"opened_date": "2026-01-01",
|
|
236
|
+
"evidence_cves": [],
|
|
237
|
+
"atlas_refs": [
|
|
238
|
+
"AML.T0018",
|
|
239
|
+
"AML.T0020"
|
|
240
|
+
],
|
|
241
|
+
"attack_refs": []
|
|
242
|
+
},
|
|
243
|
+
"ALL-MCP-TOOL-TRUST": {
|
|
244
|
+
"framework": "ALL",
|
|
245
|
+
"control_id": "UNIVERSAL-GAP-002",
|
|
246
|
+
"control_name": "MCP/Agent Tool Trust Boundaries",
|
|
247
|
+
"designed_for": "N/A — no framework has this control",
|
|
248
|
+
"misses": [
|
|
249
|
+
"No framework requires signed MCP server manifests",
|
|
250
|
+
"No framework requires AI client tool allowlisting",
|
|
251
|
+
"No framework requires authentication between AI clients and MCP servers",
|
|
252
|
+
"Developer-installed AI tool plugins are outside all vendor management control scopes"
|
|
253
|
+
],
|
|
254
|
+
"real_requirement": "MCP trust controls: signed server manifests, explicit tool allowlists, bearer authentication, sandboxed server processes, organizational approved-registry for MCP servers.",
|
|
255
|
+
"status": "open",
|
|
256
|
+
"opened_date": "2026-04-01",
|
|
257
|
+
"evidence_cves": [
|
|
258
|
+
"CVE-2026-30615"
|
|
259
|
+
],
|
|
260
|
+
"atlas_refs": [
|
|
261
|
+
"AML.T0010"
|
|
262
|
+
],
|
|
263
|
+
"attack_refs": [
|
|
264
|
+
"T1195.001"
|
|
265
|
+
]
|
|
266
|
+
},
|
|
267
|
+
"ALL-PROMPT-INJECTION-ACCESS-CONTROL": {
|
|
268
|
+
"framework": "ALL",
|
|
269
|
+
"control_id": "UNIVERSAL-GAP-003",
|
|
270
|
+
"control_name": "Prompt Injection as Access Control Failure",
|
|
271
|
+
"designed_for": "N/A — no framework has this control",
|
|
272
|
+
"misses": [
|
|
273
|
+
"Prompt injection routes around all existing access control frameworks",
|
|
274
|
+
"The AI agent's service account takes the unauthorized action — audit logs show authorized activity",
|
|
275
|
+
"No framework has controls for prompt-level authorization distinct from account-level authorization"
|
|
276
|
+
],
|
|
277
|
+
"real_requirement": "Prompt-level access control: each model invocation is constrained to an authorized action scope. Actions outside that scope require explicit user re-authorization. System prompt establishes authority hierarchy.",
|
|
278
|
+
"status": "open",
|
|
279
|
+
"opened_date": "2026-01-01",
|
|
280
|
+
"evidence_cves": [
|
|
281
|
+
"CVE-2025-53773"
|
|
282
|
+
],
|
|
283
|
+
"atlas_refs": [
|
|
284
|
+
"AML.T0051",
|
|
285
|
+
"AML.T0054"
|
|
286
|
+
],
|
|
287
|
+
"attack_refs": [
|
|
288
|
+
"T1059"
|
|
289
|
+
]
|
|
290
|
+
},
|
|
291
|
+
"NIS2-Art21-patch-management": {
|
|
292
|
+
"framework": "EU NIS2 Directive",
|
|
293
|
+
"control_id": "Article 21(2)(e)",
|
|
294
|
+
"control_name": "Vulnerability handling and disclosure",
|
|
295
|
+
"designed_for": "General vulnerability management and disclosure processes for essential and important entities",
|
|
296
|
+
"misses": [
|
|
297
|
+
"No specific guidance on CISA KEV-class response timelines (hours, not days)",
|
|
298
|
+
"No requirement for live kernel patching capability in production environments",
|
|
299
|
+
"No definition of 'appropriate timeframe' for actively exploited vulnerabilities with public PoC",
|
|
300
|
+
"AI-accelerated exploit weaponization is not a consideration in the Article 21 controls"
|
|
301
|
+
],
|
|
302
|
+
"real_requirement": "NIS2 Article 21 must be operationalized with CISA KEV-indexed SLAs: confirmed exploitation + public PoC = 4h to live-patch or isolate. 'Appropriate timeframe' requires explicit definition calibrated to exploit availability.",
|
|
303
|
+
"status": "open",
|
|
304
|
+
"opened_date": "2026-03-15",
|
|
305
|
+
"evidence_cves": [
|
|
306
|
+
"CVE-2026-31431"
|
|
307
|
+
],
|
|
308
|
+
"atlas_refs": [],
|
|
309
|
+
"attack_refs": [
|
|
310
|
+
"T1068"
|
|
311
|
+
]
|
|
312
|
+
},
|
|
313
|
+
"NIST-800-53-CM-7": {
|
|
314
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
315
|
+
"control_id": "CM-7",
|
|
316
|
+
"control_name": "Least Functionality",
|
|
317
|
+
"designed_for": "Restricting software, ports, protocols, and services to only those required for business functions",
|
|
318
|
+
"misses": [
|
|
319
|
+
"AI tool plugin authorization is not contemplated — MCP servers are not 'services' in the CM-7 sense",
|
|
320
|
+
"No mechanism for authorizing individual MCP server tool capabilities vs. blocking entire servers",
|
|
321
|
+
"Developer-installed AI plugins operate outside CM-7 enforcement scope in most implementations",
|
|
322
|
+
"No guidance on AI tool allowlisting as a CM-7 implementation technique"
|
|
323
|
+
],
|
|
324
|
+
"real_requirement": "CM-7 scope must extend to AI tool plugins. AI client tool allowlists are a CM-7 implementation: only approved MCP servers and tools may be invoked. Default deny for unapproved AI tool capabilities.",
|
|
325
|
+
"status": "open",
|
|
326
|
+
"opened_date": "2026-04-01",
|
|
327
|
+
"evidence_cves": [
|
|
328
|
+
"CVE-2026-30615"
|
|
329
|
+
],
|
|
330
|
+
"atlas_refs": [
|
|
331
|
+
"AML.T0010"
|
|
332
|
+
],
|
|
333
|
+
"attack_refs": [
|
|
334
|
+
"T1195.001"
|
|
335
|
+
]
|
|
336
|
+
},
|
|
337
|
+
"ISO-27001-2022-A.8.30": {
|
|
338
|
+
"framework": "ISO/IEC 27001:2022",
|
|
339
|
+
"control_id": "A.8.30",
|
|
340
|
+
"control_name": "Outsourced development",
|
|
341
|
+
"designed_for": "Security requirements for software developed by external parties under contract",
|
|
342
|
+
"misses": [
|
|
343
|
+
"MCP servers installed by developers are not 'outsourced development' — they are third-party plugins outside procurement scope",
|
|
344
|
+
"Developer-installed AI tool plugins bypass A.8.30 controls entirely",
|
|
345
|
+
"No control category for AI plugin supply chain risk",
|
|
346
|
+
"Contractual security requirements do not apply to open-source or self-published MCP servers"
|
|
347
|
+
],
|
|
348
|
+
"real_requirement": "A.8.30 must be extended with an 'AI tool plugin' control category: organizational approved-registry for MCP servers, security review equivalents for AI plugins, prohibition on unreviewed MCP server installation on developer machines with privileged access.",
|
|
349
|
+
"status": "open",
|
|
350
|
+
"opened_date": "2026-04-01",
|
|
351
|
+
"evidence_cves": [
|
|
352
|
+
"CVE-2026-30615"
|
|
353
|
+
],
|
|
354
|
+
"atlas_refs": [
|
|
355
|
+
"AML.T0010"
|
|
356
|
+
],
|
|
357
|
+
"attack_refs": [
|
|
358
|
+
"T1195.001"
|
|
359
|
+
]
|
|
360
|
+
},
|
|
361
|
+
"SOC2-CC9-vendor-management": {
|
|
362
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
363
|
+
"control_id": "CC9",
|
|
364
|
+
"control_name": "Risk Mitigation — Vendor and Business Partner Risk",
|
|
365
|
+
"designed_for": "Assessing and managing risk from vendors and business partners with access to system data",
|
|
366
|
+
"misses": [
|
|
367
|
+
"Developer-installed AI tool plugins are not vendors under CC9 — they are software installed by employees",
|
|
368
|
+
"MCP servers execute code in developer environments but are outside vendor risk management scope",
|
|
369
|
+
"No CC9 mechanism for AI plugin approval, monitoring, or revocation",
|
|
370
|
+
"AI coding assistant plugins with tool-use capability represent a new risk category outside CC9's vendor model"
|
|
371
|
+
],
|
|
372
|
+
"real_requirement": "CC9 must be extended to include AI tool plugins as a vendor risk category. MCP servers that access organizational systems require CC9-equivalent assessment: security review, approved-registry, monitoring, and revocation capability.",
|
|
373
|
+
"status": "open",
|
|
374
|
+
"opened_date": "2026-04-01",
|
|
375
|
+
"evidence_cves": [
|
|
376
|
+
"CVE-2026-30615"
|
|
377
|
+
],
|
|
378
|
+
"atlas_refs": [
|
|
379
|
+
"AML.T0010"
|
|
380
|
+
],
|
|
381
|
+
"attack_refs": [
|
|
382
|
+
"T1195.001"
|
|
383
|
+
]
|
|
384
|
+
},
|
|
385
|
+
"NIST-800-53-SC-28": {
|
|
386
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
387
|
+
"control_id": "SC-28",
|
|
388
|
+
"control_name": "Protection of Information at Rest",
|
|
389
|
+
"designed_for": "Cryptographic protection of data at rest using standard encryption mechanisms",
|
|
390
|
+
"misses": [
|
|
391
|
+
"Dirty Frag (CVE-2026-43284) exploits the IPsec kernel implementation — IPsec-based SC-28 compliance is not a compensating control when IPsec is the attack surface",
|
|
392
|
+
"SC-28 controls via kernel cryptographic subsystems are invalidated when those subsystems have unpatched LPE vulnerabilities",
|
|
393
|
+
"No requirement to note in SC-28 evidence when kernel CVEs affect the cryptographic implementation"
|
|
394
|
+
],
|
|
395
|
+
"real_requirement": "SC-28 compliance evidence must flag when kernel CVEs affect the cryptographic subsystem being used for compliance. IPsec-based or kernel-crypto-based SC-28 controls cannot be claimed as compensating controls for CVEs that exploit those subsystems.",
|
|
396
|
+
"status": "open",
|
|
397
|
+
"opened_date": "2026-04-01",
|
|
398
|
+
"evidence_cves": [
|
|
399
|
+
"CVE-2026-43284",
|
|
400
|
+
"CVE-2026-43500"
|
|
401
|
+
],
|
|
402
|
+
"atlas_refs": [],
|
|
403
|
+
"attack_refs": [
|
|
404
|
+
"T1068"
|
|
405
|
+
]
|
|
406
|
+
},
|
|
407
|
+
"NIST-800-53-SI-12": {
|
|
408
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
409
|
+
"control_id": "SI-12",
|
|
410
|
+
"control_name": "Information Management and Retention",
|
|
411
|
+
"designed_for": "Managing and retaining information in accordance with applicable laws, directives, regulations, and policies",
|
|
412
|
+
"misses": [
|
|
413
|
+
"AI-generated outputs in RAG pipelines lack retention and integrity controls",
|
|
414
|
+
"Prompt logs required for AI action audit trails are not addressed by SI-12 retention policies",
|
|
415
|
+
"Model inference outputs that influence security-relevant decisions have no documented retention requirements",
|
|
416
|
+
"AI training data provenance and retention is outside SI-12 scope"
|
|
417
|
+
],
|
|
418
|
+
"real_requirement": "SI-12 must be extended to include AI system data: prompt logs (security-relevant AI actions must be retained for incident investigation), model version history, inference output logs for security-sensitive decisions, training data provenance records.",
|
|
419
|
+
"status": "open",
|
|
420
|
+
"opened_date": "2026-03-01",
|
|
421
|
+
"evidence_cves": [
|
|
422
|
+
"CVE-2025-53773"
|
|
423
|
+
],
|
|
424
|
+
"atlas_refs": [
|
|
425
|
+
"AML.T0054"
|
|
426
|
+
],
|
|
427
|
+
"attack_refs": [
|
|
428
|
+
"T1059"
|
|
429
|
+
]
|
|
430
|
+
},
|
|
431
|
+
"NIST-AI-RMF-MEASURE-2.5": {
|
|
432
|
+
"framework": "NIST AI RMF 1.0",
|
|
433
|
+
"control_id": "MEASURE 2.5",
|
|
434
|
+
"control_name": "AI system to human interaction evaluation",
|
|
435
|
+
"designed_for": "Evaluating AI system outputs and behaviors in human-AI interaction contexts",
|
|
436
|
+
"misses": [
|
|
437
|
+
"MEASURE 2.5 measures human-AI interaction quality, not adversarial input resistance",
|
|
438
|
+
"Does not require adversarial prompt injection testing as a measurement activity",
|
|
439
|
+
"No methodology for measuring AI tool action authorization boundary compliance",
|
|
440
|
+
"Human feedback evaluation does not capture adversarially-induced behavioral changes"
|
|
441
|
+
],
|
|
442
|
+
"real_requirement": "MEASURE 2.5 must include adversarial evaluation: red-team testing for prompt injection, measurement of action boundary compliance (does the AI stay within authorized scope?), and behavioral regression testing after model updates.",
|
|
443
|
+
"status": "open",
|
|
444
|
+
"opened_date": "2026-01-01",
|
|
445
|
+
"evidence_cves": [
|
|
446
|
+
"CVE-2025-53773"
|
|
447
|
+
],
|
|
448
|
+
"atlas_refs": [
|
|
449
|
+
"AML.T0051",
|
|
450
|
+
"AML.T0054"
|
|
451
|
+
],
|
|
452
|
+
"attack_refs": [
|
|
453
|
+
"T1059"
|
|
454
|
+
]
|
|
455
|
+
},
|
|
456
|
+
"ISO-27001-2022-A.8.16": {
|
|
457
|
+
"framework": "ISO/IEC 27001:2022",
|
|
458
|
+
"control_id": "A.8.16",
|
|
459
|
+
"control_name": "Monitoring activities",
|
|
460
|
+
"designed_for": "Monitoring networks, systems, and applications for anomalous behavior and security events",
|
|
461
|
+
"misses": [
|
|
462
|
+
"AI API traffic as covert C2 (SesameOp) is indistinguishable from legitimate AI usage — standard A.8.16 monitoring has no signature for this pattern",
|
|
463
|
+
"LLM query monitoring as a security telemetry source is not required by A.8.16",
|
|
464
|
+
"PROMPTFLUX malware queries AI APIs during execution — this is not a recognized network anomaly in A.8.16 implementations",
|
|
465
|
+
"AI-generated code execution sequences are not a monitored behavior pattern"
|
|
466
|
+
],
|
|
467
|
+
"real_requirement": "A.8.16 must be extended with AI-specific monitoring: LLM API query monitoring (which processes query which APIs), behavioral baseline for expected AI tool usage patterns, alerting on AI API queries from unexpected processes or at unexpected volumes.",
|
|
468
|
+
"status": "open",
|
|
469
|
+
"opened_date": "2026-02-01",
|
|
470
|
+
"evidence_cves": [],
|
|
471
|
+
"atlas_refs": [
|
|
472
|
+
"AML.T0096"
|
|
473
|
+
],
|
|
474
|
+
"attack_refs": [
|
|
475
|
+
"T1071"
|
|
476
|
+
]
|
|
477
|
+
},
|
|
478
|
+
"SOC2-CC7-anomaly-detection": {
|
|
479
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
480
|
+
"control_id": "CC7",
|
|
481
|
+
"control_name": "System Operations — Threat and Vulnerability Management",
|
|
482
|
+
"designed_for": "Detecting, preventing, and responding to threats and vulnerabilities affecting the system",
|
|
483
|
+
"misses": [
|
|
484
|
+
"AI API traffic as covert C2 (ATLAS AML.T0096) does not trigger CC7 anomaly detection — traffic pattern is identical to legitimate AI usage",
|
|
485
|
+
"CC7 does not require monitoring for AI tool actions that exceed authorized scope",
|
|
486
|
+
"PROMPTFLUX real-time evasion generation via AI API queries is not a CC7 threat category",
|
|
487
|
+
"AI-generated code execution is not a recognized threat pattern in CC7 implementations"
|
|
488
|
+
],
|
|
489
|
+
"real_requirement": "CC7 anomaly detection must include AI-specific threat signatures: baseline expected AI API usage per system/process, alert on AI API queries from security-sensitive processes, monitor AI tool action logs for out-of-scope actions, include AI-as-C2 in threat model.",
|
|
490
|
+
"status": "open",
|
|
491
|
+
"opened_date": "2026-02-01",
|
|
492
|
+
"evidence_cves": [],
|
|
493
|
+
"atlas_refs": [
|
|
494
|
+
"AML.T0096",
|
|
495
|
+
"AML.T0017"
|
|
496
|
+
],
|
|
497
|
+
"attack_refs": [
|
|
498
|
+
"T1071",
|
|
499
|
+
"T1059"
|
|
500
|
+
]
|
|
501
|
+
},
|
|
502
|
+
"CIS-Controls-v8-Control7": {
|
|
503
|
+
"framework": "CIS Controls v8",
|
|
504
|
+
"control_id": "Control 7",
|
|
505
|
+
"control_name": "Continuous Vulnerability Management",
|
|
506
|
+
"designed_for": "Continuously acquiring, assessing, and taking action on vulnerability information to minimize the window of opportunity for attackers",
|
|
507
|
+
"misses": [
|
|
508
|
+
"IG3 'continuous' vulnerability management with 'within one month' for critical still creates a 30-day exploitation window for CISA KEV + public PoC",
|
|
509
|
+
"No CISA KEV-specific response tier — KEV listing implies immediate exploitation risk, not monthly remediation",
|
|
510
|
+
"AI-accelerated exploit development compresses the weaponization window from weeks to hours, invalidating the monthly critical patch assumption",
|
|
511
|
+
"Live patching capability is not referenced as a required vulnerability management tool"
|
|
512
|
+
],
|
|
513
|
+
"real_requirement": "CIS Control 7 must define a CISA KEV response tier: KEV + public PoC → 4h to deploy verified mitigation (live patch, compensating controls, or isolation). The 'within one month' window retains applicability only for vulnerabilities with no active exploitation and no public PoC.",
|
|
514
|
+
"status": "open",
|
|
515
|
+
"opened_date": "2026-03-15",
|
|
516
|
+
"evidence_cves": [
|
|
517
|
+
"CVE-2026-31431"
|
|
518
|
+
],
|
|
519
|
+
"atlas_refs": [],
|
|
520
|
+
"attack_refs": [
|
|
521
|
+
"T1068"
|
|
522
|
+
]
|
|
523
|
+
},
|
|
524
|
+
"NIST-800-53-SC-7": {
|
|
525
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
526
|
+
"control_id": "SC-7",
|
|
527
|
+
"control_name": "Boundary Protection",
|
|
528
|
+
"designed_for": "Monitor and control communications at external boundaries and key internal boundaries. Original posture assumes traffic to malicious infrastructure is identifiable by destination reputation, novel domain, or anomalous port — i.e., the C2 channel looks unlike legitimate enterprise traffic.",
|
|
529
|
+
"misses": [
|
|
530
|
+
"AI-API C2 (SesameOp pattern, PROMPTFLUX, PROMPTSTEAL) routes commands through legitimate AI provider domains (api.openai.com, api.anthropic.com, generativelanguage.googleapis.com). Destination reputation = high; novelty = zero; the boundary device sees traffic indistinguishable from sanctioned developer / business use.",
|
|
531
|
+
"TLS termination at the boundary still does not yield the content for inspection without breaking the API contract (mutual auth, server cert pinning by the SDK).",
|
|
532
|
+
"Default egress allowlists in most enterprises explicitly permit major AI provider domains for legitimate productivity use — the same channel attackers leverage.",
|
|
533
|
+
"NetFlow / Zeek-class boundary telemetry cannot distinguish benign LLM prompts from C2 prompts. The signal must come from inside the application context (which AI SDK call shape, what user identity, what data left the prompt), not the boundary."
|
|
534
|
+
],
|
|
535
|
+
"real_requirement": "SC-7 implementations that operate in environments using AI APIs MUST add an AI-egress-layer control: SDK-level prompt logging with identity binding, anomaly detection on prompt-shape / token-volume / off-business-hours patterns, and an allowlist of AI provider domains that explicitly enumerates the sanctioned business reason for each. Boundary-only SC-7 evidence is incomplete for any org with AI API access in production.",
|
|
536
|
+
"status": "open",
|
|
537
|
+
"opened_date": "2026-05-01",
|
|
538
|
+
"evidence_cves": [],
|
|
539
|
+
"atlas_refs": [
|
|
540
|
+
"AML.T0096",
|
|
541
|
+
"AML.T0017"
|
|
542
|
+
],
|
|
543
|
+
"attack_refs": [
|
|
544
|
+
"T1071",
|
|
545
|
+
"T1102",
|
|
546
|
+
"T1568"
|
|
547
|
+
]
|
|
548
|
+
},
|
|
549
|
+
"ISO-IEC-42001-2023-clause-6.1.2": {
|
|
550
|
+
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
551
|
+
"control_id": "Clause 6.1.2",
|
|
552
|
+
"control_name": "AI risk assessment",
|
|
553
|
+
"designed_for": "Lifecycle AI risk assessment as a basis for AI management system certification. Cross-walks with ISO 31000 risk methodology and ISO 23894 AI risk guidance. Applies globally — referenced under EU AI Act conformity, UK AI regulation principles, AU AI Ethics Framework, and Singapore AI Verify.",
|
|
554
|
+
"misses": [
|
|
555
|
+
"Real-time prompt injection threats — clause 6.1.2 is a periodic risk assessment, not a runtime threat surface",
|
|
556
|
+
"Cross-jurisdiction obligations (EU AI Act high-risk categorisation, NIS2 incident reporting, DORA ICT third-party register, UK CAF outcome B4, AU ISM AI annex) are not enumerated as risk inputs",
|
|
557
|
+
"LLM-API-as-C2 (SesameOp pattern, ATLAS AML.T0096) is not in the clause 6.1.2 example threat list — risk register templates omit it",
|
|
558
|
+
"No requirement to link AI risk register entries to specific TTP IDs (ATLAS / ATT&CK) — risks remain framework-internal abstractions"
|
|
559
|
+
],
|
|
560
|
+
"real_requirement": "Clause 6.1.2 risk registers must (1) ingest ATLAS v5.1.0 TTPs as enumerated AI-specific threat sources, (2) cross-reference jurisdictional obligations (EU AI Act Annex III, NIS2 Art. 21, DORA Art. 28, UK CAF B4, AU ISM AI annex, ISO 27001:2022 A.5.7), (3) include AI-API-as-C2 and prompt-injection-as-RCE as named scenarios, (4) be re-run on threat-intel triggers, not only on calendar cycles.",
|
|
561
|
+
"status": "open",
|
|
562
|
+
"opened_date": "2026-05-11",
|
|
563
|
+
"evidence_cves": [
|
|
564
|
+
"CVE-2025-53773",
|
|
565
|
+
"CVE-2026-30615"
|
|
566
|
+
],
|
|
567
|
+
"atlas_refs": [
|
|
568
|
+
"AML.T0051",
|
|
569
|
+
"AML.T0054",
|
|
570
|
+
"AML.T0096"
|
|
571
|
+
],
|
|
572
|
+
"attack_refs": [
|
|
573
|
+
"T1059",
|
|
574
|
+
"T1071"
|
|
575
|
+
]
|
|
576
|
+
},
|
|
577
|
+
"ISO-IEC-23894-2023-clause-7": {
|
|
578
|
+
"framework": "ISO/IEC 23894:2023 (AI Risk Management Guidance)",
|
|
579
|
+
"control_id": "Clause 7",
|
|
580
|
+
"control_name": "AI risk management process",
|
|
581
|
+
"designed_for": "Process-level guidance for managing risk across the AI lifecycle (design, develop, deploy, operate, decommission). Used globally as the methodological backbone behind ISO 42001 clause 6, EU AI Act risk management requirements, UK AI Assurance roadmap, AU AI Ethics Framework, and Singapore Model AI Governance Framework.",
|
|
582
|
+
"misses": [
|
|
583
|
+
"Post-deployment adversarial input drift — clause 7 treats risk identification as a phased activity rather than a continuous adversarial-evaluation loop",
|
|
584
|
+
"No requirement for red-team / adversarial prompt regression after model or system-prompt updates",
|
|
585
|
+
"Drift detection is framed around statistical model performance, not adversarial robustness — prompt-injection success rate is not a monitored signal",
|
|
586
|
+
"Cross-jurisdiction harmonisation (EU AI Act Art. 9 risk management, UK CAF, AU ISM) is referenced but not operationalised in clause 7 examples"
|
|
587
|
+
],
|
|
588
|
+
"real_requirement": "Clause 7 implementations must add a runtime adversarial-evaluation control: standing red-team prompt suite, success-rate baseline, alerting on regression after model/system-prompt change, evidence retention for incident reconstruction. Drift monitoring must include adversarial robustness, not only statistical accuracy.",
|
|
589
|
+
"status": "open",
|
|
590
|
+
"opened_date": "2026-05-11",
|
|
591
|
+
"evidence_cves": [
|
|
592
|
+
"CVE-2025-53773"
|
|
593
|
+
],
|
|
594
|
+
"atlas_refs": [
|
|
595
|
+
"AML.T0043",
|
|
596
|
+
"AML.T0051",
|
|
597
|
+
"AML.T0054"
|
|
598
|
+
],
|
|
599
|
+
"attack_refs": [
|
|
600
|
+
"T1059"
|
|
601
|
+
]
|
|
602
|
+
},
|
|
603
|
+
"OWASP-LLM-Top-10-2025-LLM01": {
|
|
604
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
605
|
+
"control_id": "LLM01",
|
|
606
|
+
"control_name": "Prompt Injection",
|
|
607
|
+
"designed_for": "App-layer compliance baseline for LLM applications. Adopted globally as a reference set under EU AI Act technical documentation, UK NCSC AI guidance, AU ACSC AI security guidance, and ISO/IEC 27001:2022 A.8.28 secure coding extensions.",
|
|
608
|
+
"misses": [
|
|
609
|
+
"AI-API as C2 channel — LLM01 frames prompt injection as application output integrity, not network egress posture (SesameOp / ATLAS AML.T0096 is out of scope)",
|
|
610
|
+
"Legitimate-endpoint covert use — guidance assumes the malicious instruction is in the prompt, not that the LLM endpoint itself is the C2 destination",
|
|
611
|
+
"Indirect prompt injection via PR descriptions / web pages / RAG corpora is named but mitigations are advisory, not testable controls",
|
|
612
|
+
"No control mapping back to ATT&CK T1071 (Application Layer Protocol) or T1102 (Web Service) — LLM01 sits in an AI silo separated from network defence"
|
|
613
|
+
],
|
|
614
|
+
"real_requirement": "LLM01 implementation must bind to network-egress controls: SDK-level prompt logging with identity binding, allowlisted AI provider domains with documented business justification, anomaly detection on prompt shape/volume/timing, and ATLAS+ATT&CK dual-mapping for every LLM01 finding so SOC tooling can correlate with non-AI telemetry.",
|
|
615
|
+
"status": "open",
|
|
616
|
+
"opened_date": "2026-05-11",
|
|
617
|
+
"evidence_cves": [
|
|
618
|
+
"CVE-2025-53773"
|
|
619
|
+
],
|
|
620
|
+
"atlas_refs": [
|
|
621
|
+
"AML.T0051",
|
|
622
|
+
"AML.T0054",
|
|
623
|
+
"AML.T0096"
|
|
624
|
+
],
|
|
625
|
+
"attack_refs": [
|
|
626
|
+
"T1059",
|
|
627
|
+
"T1071"
|
|
628
|
+
]
|
|
629
|
+
},
|
|
630
|
+
"OWASP-LLM-Top-10-2025-LLM02": {
|
|
631
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
632
|
+
"control_id": "LLM02",
|
|
633
|
+
"control_name": "Sensitive Information Disclosure",
|
|
634
|
+
"designed_for": "Preventing LLM applications from disclosing sensitive data via outputs, system prompts, or training data leakage. Cross-walks to GDPR Art. 32, UK DPA 2018 security principle, AU Privacy Act APP 11, HIPAA Security Rule, PCI DSS Req. 3, and ISO 27001:2022 A.5.34.",
|
|
635
|
+
"misses": [
|
|
636
|
+
"PHI / PII inside the model context window has no retention or minimisation requirement — LLM02 treats the prompt as ephemeral when providers retain it",
|
|
637
|
+
"Prompt injection (LLM01) and sensitive disclosure (LLM02) are treated as separate findings — chained exfiltration via injected instructions is not a primary scenario",
|
|
638
|
+
"Cross-tenant prompt cache leakage (provider-side) is not in scope — LLM02 stops at the application boundary",
|
|
639
|
+
"No requirement for DPIA-equivalent assessment (EU AI Act, GDPR Art. 35, UK ICO AI guidance) when sensitive data enters prompts"
|
|
640
|
+
],
|
|
641
|
+
"real_requirement": "LLM02 must require: prompt-level data minimisation (DLP before send), DPIA-equivalent assessment when sensitive categories enter prompts (GDPR / UK ICO / AU Privacy Act / HIPAA), explicit provider data-retention contractual terms, and chained-scenario testing combining LLM01 + LLM02 (injection-driven exfiltration).",
|
|
642
|
+
"status": "open",
|
|
643
|
+
"opened_date": "2026-05-11",
|
|
644
|
+
"evidence_cves": [
|
|
645
|
+
"CVE-2025-53773"
|
|
646
|
+
],
|
|
647
|
+
"atlas_refs": [
|
|
648
|
+
"AML.T0054"
|
|
649
|
+
],
|
|
650
|
+
"attack_refs": [
|
|
651
|
+
"T1059",
|
|
652
|
+
"T1530"
|
|
653
|
+
]
|
|
654
|
+
},
|
|
655
|
+
"OWASP-LLM-Top-10-2025-LLM06": {
|
|
656
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
657
|
+
"control_id": "LLM06",
|
|
658
|
+
"control_name": "Excessive Agency",
|
|
659
|
+
"designed_for": "Limiting the autonomy granted to LLM agents — tool scope, action authority, and human-in-the-loop placement. Cross-walks to EU AI Act Art. 14 (human oversight), UK CAF outcome B4, AU AI Ethics Framework principle of human-centred values, NIST AI RMF GOVERN-1.5.",
|
|
660
|
+
"misses": [
|
|
661
|
+
"MCP/agent-trust class — LLM06 is application-internal; it does not address third-party tool plugins (MCP servers) that arrive via developer install rather than enterprise procurement",
|
|
662
|
+
"No requirement for signed tool manifests or organisational tool allowlists — 'limit functionality' is advisory",
|
|
663
|
+
"Agent-to-agent delegation (one LLM calling another with its own tools) is not modelled — the agency boundary is treated as a single hop",
|
|
664
|
+
"No mapping to supply-chain controls (ISO 27001 A.8.30, NIST SA-12, SOC 2 CC9) — excessive agency via supply chain is a blind spot"
|
|
665
|
+
],
|
|
666
|
+
"real_requirement": "LLM06 must require: signed MCP server manifests, organisational tool allowlists enforced at the AI client, per-invocation authorisation scopes (not per-account), and supply-chain governance for AI tool plugins equivalent to critical third-party software (ISO A.8.30 / SOC 2 CC9 / NIST SA-12 extended).",
|
|
667
|
+
"status": "open",
|
|
668
|
+
"opened_date": "2026-05-11",
|
|
669
|
+
"evidence_cves": [
|
|
670
|
+
"CVE-2026-30615",
|
|
671
|
+
"CVE-2025-53773"
|
|
672
|
+
],
|
|
673
|
+
"atlas_refs": [
|
|
674
|
+
"AML.T0010",
|
|
675
|
+
"AML.T0016",
|
|
676
|
+
"AML.T0051"
|
|
677
|
+
],
|
|
678
|
+
"attack_refs": [
|
|
679
|
+
"T1195.001",
|
|
680
|
+
"T1059"
|
|
681
|
+
]
|
|
682
|
+
},
|
|
683
|
+
"OWASP-LLM-Top-10-2025-LLM08": {
|
|
684
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
685
|
+
"control_id": "LLM08",
|
|
686
|
+
"control_name": "Vector and Embedding Weaknesses",
|
|
687
|
+
"designed_for": "RAG-class issues: embedding poisoning, retrieval manipulation, embedding inversion, cross-tenant retrieval leakage. Cross-walks to ISO 27001:2022 A.8.28 secure coding, NIST AI RMF MAP-2.3, EU AI Act Art. 10 data governance, UK NCSC RAG guidance.",
|
|
688
|
+
"misses": [
|
|
689
|
+
"Indirect prompt injection via poisoned retrieval documents is named but no concrete test methodology is given",
|
|
690
|
+
"Embedding inversion (recovering source text from embeddings) is treated as theoretical despite working PoCs against common embedding models",
|
|
691
|
+
"No requirement for cross-tenant isolation testing of shared vector stores — multi-tenant SaaS RAG is a primary deployment pattern",
|
|
692
|
+
"Provenance and integrity of corpus documents (signed sources, content-addressable storage) are not required",
|
|
693
|
+
"No mapping to global data-governance regimes (GDPR Art. 5(1)(f), AU APP 11, UK DPA 2018) for the embedding store as a sensitive-data location"
|
|
694
|
+
],
|
|
695
|
+
"real_requirement": "LLM08 must require: corpus document provenance and integrity (signed sources, content hashing), cross-tenant isolation testing for shared vector stores, embedding-inversion risk assessment for embeddings of sensitive data, retrieval-poisoning regression tests, and treatment of embedding stores as sensitive-data systems under applicable privacy regimes.",
|
|
696
|
+
"status": "open",
|
|
697
|
+
"opened_date": "2026-05-11",
|
|
698
|
+
"evidence_cves": [],
|
|
699
|
+
"atlas_refs": [
|
|
700
|
+
"AML.T0018",
|
|
701
|
+
"AML.T0020",
|
|
702
|
+
"AML.T0043"
|
|
703
|
+
],
|
|
704
|
+
"attack_refs": [
|
|
705
|
+
"T1565",
|
|
706
|
+
"T1530"
|
|
707
|
+
]
|
|
708
|
+
},
|
|
709
|
+
"OWASP-ASVS-v5.0-V14": {
|
|
710
|
+
"framework": "OWASP ASVS v5.0",
|
|
711
|
+
"control_id": "V14",
|
|
712
|
+
"control_name": "Configuration verification",
|
|
713
|
+
"designed_for": "Application-level configuration audit: build config, dependencies, runtime hardening, secrets management. Used as the cross-walk baseline for ISO 27001 A.8.9 (configuration management), NIST 800-53 CM-6, SOC 2 CC7, PCI DSS 2.x, and AU ISM configuration controls.",
|
|
714
|
+
"misses": [
|
|
715
|
+
"AI-API configuration — model selection, temperature, system prompt, safety setting, provider data-retention setting are not audited as security configuration items",
|
|
716
|
+
"MCP server configuration — server registry source, signature verification policy, transport authentication mode are not in scope",
|
|
717
|
+
"Agent tool allowlists — V14 has no concept of a per-AI-client tool allowlist as a configuration object subject to verification",
|
|
718
|
+
"No requirement to version-control AI configuration alongside application code"
|
|
719
|
+
],
|
|
720
|
+
"real_requirement": "V14 must add an AI configuration class: model + provider + system prompt + safety setting + data-retention setting under version control and review; MCP server registry source and signature policy verified; AI client tool allowlist treated as a security-relevant configuration object subject to change control and audit.",
|
|
721
|
+
"status": "open",
|
|
722
|
+
"opened_date": "2026-05-11",
|
|
723
|
+
"evidence_cves": [
|
|
724
|
+
"CVE-2026-30615"
|
|
725
|
+
],
|
|
726
|
+
"atlas_refs": [
|
|
727
|
+
"AML.T0010",
|
|
728
|
+
"AML.T0016"
|
|
729
|
+
],
|
|
730
|
+
"attack_refs": [
|
|
731
|
+
"T1195.001"
|
|
732
|
+
]
|
|
733
|
+
},
|
|
734
|
+
"NIST-800-218-SSDF": {
|
|
735
|
+
"framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
|
|
736
|
+
"control_id": "SSDF (all tasks)",
|
|
737
|
+
"control_name": "Secure Software Development Framework",
|
|
738
|
+
"designed_for": "Producer-side secure SDLC: prepare organisation, protect software, produce well-secured software, respond to vulnerabilities. Referenced by US EO 14028, FedRAMP, CMMC, and cross-walked by EU CRA (Cyber Resilience Act), UK NCSC Secure Development & Deployment, AU ISM software development controls, and ISO/IEC 27034.",
|
|
739
|
+
"misses": [
|
|
740
|
+
"AI-generated code provenance — SSDF treats source code as human-authored; AI-assistant output (Copilot, Cursor, Codex, Claude Code) has no provenance attestation in PW.4",
|
|
741
|
+
"Vendored-but-unsigned models in deployment artifacts — model weights shipped inside containers / packages are not in PS.3 software inventory",
|
|
742
|
+
"No SBOM requirement for model weights, training data manifests, or RAG corpora — PS.3 is silent on AI components",
|
|
743
|
+
"RV.1 vulnerability response assumes a CVE process; model-level vulnerabilities (jailbreaks, prompt-injection regressions) have no equivalent intake"
|
|
744
|
+
],
|
|
745
|
+
"real_requirement": "SSDF must extend: PW.4 to require provenance markers on AI-generated code blocks (commit metadata, review evidence); PS.3 to include model weights, training data manifests, and RAG corpora in the software inventory / SBOM; RV.1 to accept and triage model-level vulnerability reports (jailbreaks, prompt-injection regressions, embedding inversion) on equal footing with code CVEs. Aligns with EU CRA Annex I, UK NCSC, AU ISM.",
|
|
746
|
+
"status": "open",
|
|
747
|
+
"opened_date": "2026-05-11",
|
|
748
|
+
"evidence_cves": [
|
|
749
|
+
"CVE-2025-53773",
|
|
750
|
+
"CVE-2026-30615"
|
|
751
|
+
],
|
|
752
|
+
"atlas_refs": [
|
|
753
|
+
"AML.T0010",
|
|
754
|
+
"AML.T0018",
|
|
755
|
+
"AML.T0020"
|
|
756
|
+
],
|
|
757
|
+
"attack_refs": [
|
|
758
|
+
"T1195.001"
|
|
759
|
+
]
|
|
760
|
+
},
|
|
761
|
+
"NIST-800-82r3": {
|
|
762
|
+
"framework": "NIST SP 800-82 Rev 3 (Guide to OT Security)",
|
|
763
|
+
"control_id": "800-82r3 (overall guidance)",
|
|
764
|
+
"control_name": "Guide to Operational Technology (OT) Security",
|
|
765
|
+
"designed_for": "Security guidance for ICS/SCADA/DCS/PLC environments. Cross-walks to IEC 62443, EU NIS2 (essential entities — energy, water, transport), UK NCSC OT guidance and CAF for OT, AU SOCI Act + AESCSF (Australian Energy Sector Cyber Security Framework), and ISO 27019.",
|
|
766
|
+
"misses": [
|
|
767
|
+
"AI-enabled OT operator assistants — LLM copilots in control rooms are not contemplated; the trust model assumes human operators, not human+LLM operators",
|
|
768
|
+
"LLM-as-engineering-interface to ICS — natural-language operator tools that translate intent into PLC commands have no isolation requirement",
|
|
769
|
+
"Prompt-injection-driven safety state change is not in the 800-82r3 threat catalogue",
|
|
770
|
+
"AI-API egress from OT networks (for assistant features) violates the air-gap assumption that underpins many 800-82r3 zones-and-conduits diagrams"
|
|
771
|
+
],
|
|
772
|
+
"real_requirement": "800-82r3 must add an AI-in-OT control class: (1) explicit prohibition or strict gating of LLM operator assistants in safety-critical zones, (2) prompt-injection threat-model entries for any natural-language operator interface, (3) treat AI-API egress from OT as a conduit requiring named approval and monitoring (NIS2 essential-entity reportable), (4) cross-walk to IEC 62443-3-3 SR 5.1 (network segmentation) for AI-API traffic.",
|
|
773
|
+
"status": "open",
|
|
774
|
+
"opened_date": "2026-05-11",
|
|
775
|
+
"evidence_cves": [
|
|
776
|
+
"CVE-2025-53773"
|
|
777
|
+
],
|
|
778
|
+
"atlas_refs": [
|
|
779
|
+
"AML.T0051",
|
|
780
|
+
"AML.T0054",
|
|
781
|
+
"AML.T0096"
|
|
782
|
+
],
|
|
783
|
+
"attack_refs": [
|
|
784
|
+
"T0883",
|
|
785
|
+
"T0855",
|
|
786
|
+
"T1071"
|
|
787
|
+
]
|
|
788
|
+
},
|
|
789
|
+
"NIST-800-63B-rev4": {
|
|
790
|
+
"framework": "NIST SP 800-63B Rev 4 (Digital Identity Guidelines — Authentication & Lifecycle Mgmt)",
|
|
791
|
+
"control_id": "800-63B-rev4",
|
|
792
|
+
"control_name": "Authentication and Lifecycle Management (AAL/IAL/FAL)",
|
|
793
|
+
"designed_for": "Authentication assurance levels for human subscribers and non-person entities (NPEs). Referenced by US Federal services, cross-walked by EU eIDAS 2.0 (assurance levels low/substantial/high), UK GPG 44/45, AU TDIF (Trusted Digital Identity Framework), and ISO/IEC 29115.",
|
|
794
|
+
"misses": [
|
|
795
|
+
"AI agents as principals — 800-63B treats NPEs as long-lived service accounts; AI agents are short-lived, intent-driven, and act on behalf of a chain of humans/agents",
|
|
796
|
+
"Agent-to-agent authentication — no AAL-equivalent concept for one agent authenticating another with a derived authority scope",
|
|
797
|
+
"Ephemeral session keys for AI workflows — the assumption that authenticator binding is long-lived breaks for per-invocation agent runs",
|
|
798
|
+
"No equivalence with eIDAS 2.0 'electronic attestation of attributes' for agent capability tokens — cross-jurisdiction interop gap"
|
|
799
|
+
],
|
|
800
|
+
"real_requirement": "800-63B Rev 4 must add an AAL-A (agent assurance level) construct: per-invocation authenticator binding, capability-scoped tokens (what this agent is permitted to do this run), agent-to-agent delegation chains with non-repudiation, and explicit cross-walk to eIDAS 2.0 attestations, UK GPG 45, AU TDIF, and ISO 29115 for cross-border agent identity.",
|
|
801
|
+
"status": "open",
|
|
802
|
+
"opened_date": "2026-05-11",
|
|
803
|
+
"evidence_cves": [
|
|
804
|
+
"CVE-2025-53773"
|
|
805
|
+
],
|
|
806
|
+
"atlas_refs": [
|
|
807
|
+
"AML.T0051",
|
|
808
|
+
"AML.T0054"
|
|
809
|
+
],
|
|
810
|
+
"attack_refs": [
|
|
811
|
+
"T1078",
|
|
812
|
+
"T1059"
|
|
813
|
+
]
|
|
814
|
+
},
|
|
815
|
+
"IEC-62443-3-3": {
|
|
816
|
+
"framework": "IEC 62443-3-3 (Industrial communication networks — security for IACS)",
|
|
817
|
+
"control_id": "62443-3-3",
|
|
818
|
+
"control_name": "System security requirements and security levels",
|
|
819
|
+
"designed_for": "System-level security requirements for industrial automation and control systems (IACS), organised by foundational requirements (FR1–FR7) and security levels (SL1–SL4). Cross-walks to NIST 800-82r3, EU NIS2 (manufacturing/energy/water essential entities), UK NCSC CAF for OT, AU SOCI/AESCSF, and ISO 27019.",
|
|
820
|
+
"misses": [
|
|
821
|
+
"AI-augmented HMI — natural-language HMI overlays (operator copilots) are not modelled in FR1 (Identification and Authentication Control) or FR3 (System Integrity)",
|
|
822
|
+
"LLM-assisted OT operations — prompt injection routed through a copilot can drive HMI actions while every FR1 control reports normal operator identity",
|
|
823
|
+
"No security-level requirement (SL1–SL4) addresses AI-API egress from a control zone — conduits-and-zones model predates AI assistants",
|
|
824
|
+
"FR6 (Timely Response to Events) has no AI-specific signature class (prompt-injection-induced commands, AI-API as exfil channel)"
|
|
825
|
+
],
|
|
826
|
+
"real_requirement": "62443-3-3 must add AI-in-OT requirements: SL2+ environments must prohibit or strictly gate LLM HMI overlays; FR1 must distinguish 'human operator action' from 'AI-mediated action initiated by operator' as separate identity claims; conduits-and-zones diagrams must enumerate AI-API egress as a named conduit subject to FR5 (Restricted Data Flow) and monitored under FR6.",
|
|
827
|
+
"status": "open",
|
|
828
|
+
"opened_date": "2026-05-11",
|
|
829
|
+
"evidence_cves": [
|
|
830
|
+
"CVE-2025-53773"
|
|
831
|
+
],
|
|
832
|
+
"atlas_refs": [
|
|
833
|
+
"AML.T0051",
|
|
834
|
+
"AML.T0054",
|
|
835
|
+
"AML.T0096"
|
|
836
|
+
],
|
|
837
|
+
"attack_refs": [
|
|
838
|
+
"T0883",
|
|
839
|
+
"T0855",
|
|
840
|
+
"T1071"
|
|
841
|
+
]
|
|
842
|
+
},
|
|
843
|
+
"FedRAMP-Rev5-Moderate": {
|
|
844
|
+
"framework": "FedRAMP Rev 5 Moderate",
|
|
845
|
+
"control_id": "FedRAMP-Rev5-Moderate (baseline)",
|
|
846
|
+
"control_name": "FedRAMP Moderate baseline (NIST 800-53 Rev 5 tailoring)",
|
|
847
|
+
"designed_for": "Authorised cloud service offerings for US federal use at Moderate impact. Cross-walks to UK G-Cloud / Cyber Essentials Plus, EU EUCS (European Cybersecurity Certification Scheme for Cloud Services) Substantial level, AU IRAP PROTECTED, and ISO 27017/27018.",
|
|
848
|
+
"misses": [
|
|
849
|
+
"AI service shared-responsibility model — OpenAI, Anthropic, Google Gemini are not FedRAMP-authorised for most use cases but are legitimately and pervasively used by federal contractors and agencies in non-authorised modes",
|
|
850
|
+
"No FedRAMP-equivalent attestation path for AI providers — the gap drives 'shadow AI' where employees use unauthorised AI for authorised work",
|
|
851
|
+
"AC-2 / AC-6 / AU-2 evidence assumes the workload boundary is the cloud service — AI API calls cross that boundary in ways the SSP does not document",
|
|
852
|
+
"No alignment with EU EUCS or AU IRAP for cross-border federal contractor AI use"
|
|
853
|
+
],
|
|
854
|
+
"real_requirement": "FedRAMP Rev 5 Moderate must publish: (1) an AI provider attestation path (StateRAMP-equivalent or FedRAMP Tailored for AI services), (2) explicit shared-responsibility matrix for AI APIs covering prompt data, output data, training opt-out, and retention, (3) SSP template language for documenting AI API usage in authorised systems, (4) cross-walk to EU EUCS Substantial and AU IRAP PROTECTED for joint operations.",
|
|
855
|
+
"status": "open",
|
|
856
|
+
"opened_date": "2026-05-11",
|
|
857
|
+
"evidence_cves": [
|
|
858
|
+
"CVE-2025-53773",
|
|
859
|
+
"CVE-2026-30615"
|
|
860
|
+
],
|
|
861
|
+
"atlas_refs": [
|
|
862
|
+
"AML.T0051",
|
|
863
|
+
"AML.T0096"
|
|
864
|
+
],
|
|
865
|
+
"attack_refs": [
|
|
866
|
+
"T1071",
|
|
867
|
+
"T1059"
|
|
868
|
+
]
|
|
869
|
+
},
|
|
870
|
+
"CMMC-2.0-Level-2": {
|
|
871
|
+
"framework": "CMMC 2.0 (Cybersecurity Maturity Model Certification) Level 2",
|
|
872
|
+
"control_id": "CMMC-2.0-Level-2",
|
|
873
|
+
"control_name": "Level 2 — Advanced (110 NIST 800-171 Rev 2 controls)",
|
|
874
|
+
"designed_for": "US DoD Defense Industrial Base (DIB) contractor protection of Controlled Unclassified Information (CUI). Cross-walks to UK Cyber Essentials Plus + DEF STAN 05-138, EU CRA + NIS2 for defence supply chains, AU DISP (Defence Industry Security Program), and ISO 27001 + 27017 supplemented by NIST 800-171.",
|
|
875
|
+
"misses": [
|
|
876
|
+
"Same AI gaps as FedRAMP — no equivalence path for unauthorised AI providers used by DIB contractors",
|
|
877
|
+
"Defense contractor AI tool inventory — no requirement to maintain an inventory of AI assistants (Copilot, Cursor, Claude Code, MCP servers) with access to CUI-adjacent environments",
|
|
878
|
+
"3.13.x system and communications protection controls do not address AI-API egress as a CUI exfiltration channel",
|
|
879
|
+
"3.14.x system and information integrity controls do not address prompt-injection RCE in developer tooling (CVE-2025-53773 class)",
|
|
880
|
+
"No cross-walk to allied frameworks (UK DEF STAN, AU DISP) for AI use in joint programmes"
|
|
881
|
+
],
|
|
882
|
+
"real_requirement": "CMMC 2.0 Level 2 must require: (1) inventory of AI assistants and MCP servers with CUI-adjacent access (3.4.1 extension), (2) AI-API egress monitoring as a CUI protection control (3.13 extension), (3) prompt-injection RCE in developer tooling as a 3.14 threat class with patching SLA, (4) explicit cross-walk to UK DEF STAN 05-138 and AU DISP for joint-programme AI policy parity.",
|
|
883
|
+
"status": "open",
|
|
884
|
+
"opened_date": "2026-05-11",
|
|
885
|
+
"evidence_cves": [
|
|
886
|
+
"CVE-2025-53773",
|
|
887
|
+
"CVE-2026-30615"
|
|
888
|
+
],
|
|
889
|
+
"atlas_refs": [
|
|
890
|
+
"AML.T0010",
|
|
891
|
+
"AML.T0051",
|
|
892
|
+
"AML.T0096"
|
|
893
|
+
],
|
|
894
|
+
"attack_refs": [
|
|
895
|
+
"T1195.001",
|
|
896
|
+
"T1071",
|
|
897
|
+
"T1059"
|
|
898
|
+
]
|
|
899
|
+
},
|
|
900
|
+
"HIPAA-Security-Rule-164.312(a)(1)": {
|
|
901
|
+
"framework": "HIPAA Security Rule (45 CFR § 164.312)",
|
|
902
|
+
"control_id": "164.312(a)(1)",
|
|
903
|
+
"control_name": "Access control standard (technical safeguards)",
|
|
904
|
+
"designed_for": "Technical safeguards for access to ePHI: unique user identification, emergency access, automatic logoff, encryption/decryption. Cross-walks to EU GDPR Art. 32 (security of processing) and EHDS (European Health Data Space), UK DPA 2018 + NHS DSPT, AU Privacy Act APP 11 + My Health Records Act, and ISO 27799.",
|
|
905
|
+
"misses": [
|
|
906
|
+
"PHI in LLM context windows — 164.312(a)(1) defines access by user identity; once PHI enters a prompt sent to a third-party LLM, the access boundary is the provider's, not the covered entity's",
|
|
907
|
+
"AI-generated note workflows (ambient scribes, summarisation, coding assistants) — provider-side prompt retention is not addressed by 164.312(a)(1) and is rarely covered by BAAs at the granularity required",
|
|
908
|
+
"Automatic logoff is meaningless for an AI agent session that persists across human sessions",
|
|
909
|
+
"No equivalence with GDPR Art. 35 DPIA / UK NHS DSPT / AU My Health Records Act for AI processing of health data — covered entities operating cross-border face unresolved obligations"
|
|
910
|
+
],
|
|
911
|
+
"real_requirement": "164.312(a)(1) implementation must add: (1) BAA-level coverage for AI providers including prompt retention, training opt-out, and breach notification within HIPAA timelines, (2) per-prompt PHI minimisation (DLP), (3) AI agent session controls treated separately from human user controls, (4) cross-walk with GDPR Art. 35 / UK NHS DSPT / AU APP 11 for cross-border health data in AI workflows.",
|
|
912
|
+
"status": "open",
|
|
913
|
+
"opened_date": "2026-05-11",
|
|
914
|
+
"evidence_cves": [
|
|
915
|
+
"CVE-2025-53773"
|
|
916
|
+
],
|
|
917
|
+
"atlas_refs": [
|
|
918
|
+
"AML.T0054",
|
|
919
|
+
"AML.T0096"
|
|
920
|
+
],
|
|
921
|
+
"attack_refs": [
|
|
922
|
+
"T1071",
|
|
923
|
+
"T1530"
|
|
924
|
+
]
|
|
925
|
+
},
|
|
926
|
+
"HITRUST-CSF-v11.4-09.l": {
|
|
927
|
+
"framework": "HITRUST CSF v11.4",
|
|
928
|
+
"control_id": "09.l",
|
|
929
|
+
"control_name": "Outsourced services management",
|
|
930
|
+
"designed_for": "Management of outsourced service provider relationships with access to in-scope data (healthcare-anchored but used across regulated industries). Cross-walks to ISO 27001:2022 A.5.19/A.5.21/A.5.22, NIST SP 800-53 SA-9, SOC 2 CC9, EU NIS2 Art. 21(2)(d), UK NHS DSPT, AU Essential Eight + Privacy Act third-party clauses.",
|
|
931
|
+
"misses": [
|
|
932
|
+
"AI vendor as outsourced service — 09.l contractual model assumes a named service provider relationship; AI APIs are often consumed via developer self-signup, bypassing procurement",
|
|
933
|
+
"No requirement for AI-specific contractual clauses: prompt retention, training opt-out, data residency, model version pinning, provider security incident notification specifically for prompt/output breaches",
|
|
934
|
+
"BAA / DPA templates referenced by 09.l predate AI-specific data-handling categories",
|
|
935
|
+
"No cross-walk to EU AI Act Art. 25 (importers/distributors) or UK ICO AI guidance for AI-vendor third-party assurance"
|
|
936
|
+
],
|
|
937
|
+
"real_requirement": "09.l must require: (1) AI vendor inventory separate from general SaaS inventory, (2) AI-specific contractual clauses (prompt retention, training opt-out, residency, version pinning, prompt-breach notification timeline), (3) self-signup AI usage prohibited for in-scope data, (4) cross-walk to EU AI Act Art. 25, UK ICO AI guidance, AU Privacy Act third-party obligations.",
|
|
938
|
+
"status": "open",
|
|
939
|
+
"opened_date": "2026-05-11",
|
|
940
|
+
"evidence_cves": [
|
|
941
|
+
"CVE-2025-53773",
|
|
942
|
+
"CVE-2026-30615"
|
|
943
|
+
],
|
|
944
|
+
"atlas_refs": [
|
|
945
|
+
"AML.T0010",
|
|
946
|
+
"AML.T0054"
|
|
947
|
+
],
|
|
948
|
+
"attack_refs": [
|
|
949
|
+
"T1195.001"
|
|
950
|
+
]
|
|
951
|
+
},
|
|
952
|
+
"NERC-CIP-007-6-R4": {
|
|
953
|
+
"framework": "NERC CIP-007-6 (BES Cyber System Security Management)",
|
|
954
|
+
"control_id": "R4",
|
|
955
|
+
"control_name": "Security event monitoring",
|
|
956
|
+
"designed_for": "Security event monitoring for Bulk Electric System (BES) Cyber Systems in North America. Cross-walks to EU NIS2 (energy essential entity), UK Energy Emergencies Executive Committee + NCSC OT guidance, AU SOCI Act + AESCSF, and IEC 62443-3-3 FR6.",
|
|
957
|
+
"misses": [
|
|
958
|
+
"AI operator-assistant tooling in OT control rooms — CIP-007-6 R4 enumerates events on BES Cyber Assets; LLM copilots routed via corporate IT are not enumerated event sources",
|
|
959
|
+
"AI-API egress from corporate-to-OT boundary networks is not a monitored event class",
|
|
960
|
+
"Prompt-injection-induced operator commands appear in operator-action logs as normal operator activity — no R4 detection content addresses this",
|
|
961
|
+
"No cross-walk to NIS2 incident reporting timelines (24h early warning, 72h notification) for AI-mediated OT incidents"
|
|
962
|
+
],
|
|
963
|
+
"real_requirement": "CIP-007-6 R4 must enumerate: (1) AI operator assistants as monitored event sources with explicit alerting on assistant-initiated operator commands, (2) AI-API egress events at the corporate-to-OT boundary, (3) prompt-injection indicators as a distinct event class, (4) alignment of R4 monitoring outputs with NIS2 24h/72h reporting obligations for multinational operators.",
|
|
964
|
+
"status": "open",
|
|
965
|
+
"opened_date": "2026-05-11",
|
|
966
|
+
"evidence_cves": [
|
|
967
|
+
"CVE-2025-53773"
|
|
968
|
+
],
|
|
969
|
+
"atlas_refs": [
|
|
970
|
+
"AML.T0051",
|
|
971
|
+
"AML.T0054",
|
|
972
|
+
"AML.T0096"
|
|
973
|
+
],
|
|
974
|
+
"attack_refs": [
|
|
975
|
+
"T0883",
|
|
976
|
+
"T0855",
|
|
977
|
+
"T1071"
|
|
978
|
+
]
|
|
979
|
+
},
|
|
980
|
+
"PSD2-RTS-SCA": {
|
|
981
|
+
"framework": "EU PSD2 Regulatory Technical Standards on Strong Customer Authentication (Commission Delegated Regulation (EU) 2018/389)",
|
|
982
|
+
"control_id": "RTS-SCA",
|
|
983
|
+
"control_name": "Strong Customer Authentication and Common and Secure Communication",
|
|
984
|
+
"designed_for": "Two-of-three-factor SCA for electronic payments and account access. Cross-walks to UK PSRs 2017 + FCA SCA-RTS (post-Brexit equivalent), AU CDR (Consumer Data Right) authentication, eIDAS 2.0 high-assurance authentication, and ISO 27001:2022 A.5.16 / A.8.5.",
|
|
985
|
+
"misses": [
|
|
986
|
+
"AI agent as transaction initiator on customer's behalf — RTS-SCA contemplates the customer or a payment initiation service provider (PISP), not an autonomous AI agent acting under delegated authority",
|
|
987
|
+
"No SCA-equivalent mechanism for agent-to-bank transaction initiation with non-repudiation",
|
|
988
|
+
"Prompt-injection-induced transactions via banking copilots present a fully SCA-compliant audit trail (the customer's authenticated session) — RTS-SCA is silent on injected intent",
|
|
989
|
+
"No cross-walk to eIDAS 2.0 attestations for AI-agent transaction authority"
|
|
990
|
+
],
|
|
991
|
+
"real_requirement": "RTS-SCA (and UK FCA SCA-RTS, AU CDR) must define an agent-initiation construct: explicit delegated-authority attestation per agent transaction class, scope-limited authority tokens (amount, counterparty, frequency), and a distinct audit indicator for AI-mediated transactions so injected intent can be detected post-hoc. Aligns with eIDAS 2.0 electronic attestations.",
|
|
992
|
+
"status": "open",
|
|
993
|
+
"opened_date": "2026-05-11",
|
|
994
|
+
"evidence_cves": [
|
|
995
|
+
"CVE-2025-53773"
|
|
996
|
+
],
|
|
997
|
+
"atlas_refs": [
|
|
998
|
+
"AML.T0051",
|
|
999
|
+
"AML.T0054"
|
|
1000
|
+
],
|
|
1001
|
+
"attack_refs": [
|
|
1002
|
+
"T1078",
|
|
1003
|
+
"T1059"
|
|
1004
|
+
]
|
|
1005
|
+
},
|
|
1006
|
+
"SWIFT-CSCF-v2026-1.1": {
|
|
1007
|
+
"framework": "SWIFT Customer Security Controls Framework v2026",
|
|
1008
|
+
"control_id": "1.1",
|
|
1009
|
+
"control_name": "SWIFT Environment Protection",
|
|
1010
|
+
"designed_for": "Baseline security controls for SWIFT users — secure zone, segregation, hardening. Mandatory for all SWIFT-connected institutions globally; cross-walks to EU DORA Art. 28 (ICT third-party risk), UK PRA SS1/21 operational resilience, AU APRA CPS 234, and ISO 27001 A.8.22 (segregation of networks).",
|
|
1011
|
+
"misses": [
|
|
1012
|
+
"AI-mediated transaction generation — natural-language operator tools that draft MT/MX messages are not in the CSCF v2026 1.1 secure-zone trust model",
|
|
1013
|
+
"LLM-assisted operations on the SWIFT secure zone — copilot-style assistants for operations / reconciliation / sanctions screening introduce an unmodelled trust boundary",
|
|
1014
|
+
"AI-API egress from the SWIFT secure zone (or its administrative jump zone) violates the segregation assumption underlying 1.1 but is not explicitly named as a prohibited conduit",
|
|
1015
|
+
"No cross-walk to DORA Art. 28 for AI as an ICT third-party service supporting critical or important functions"
|
|
1016
|
+
],
|
|
1017
|
+
"real_requirement": "CSCF v2026 1.1 must add: (1) explicit prohibition or strict gating of LLM assistants inside the SWIFT secure zone, (2) named-conduit treatment for AI-API egress from administrative jump zones with monitoring, (3) AI-generated message drafts flagged as a distinct review class before release, (4) alignment with DORA Art. 28 register of AI ICT third-party providers supporting critical functions, plus UK PRA SS1/21 and AU APRA CPS 234.",
|
|
1018
|
+
"status": "open",
|
|
1019
|
+
"opened_date": "2026-05-11",
|
|
1020
|
+
"evidence_cves": [
|
|
1021
|
+
"CVE-2025-53773"
|
|
1022
|
+
],
|
|
1023
|
+
"atlas_refs": [
|
|
1024
|
+
"AML.T0051",
|
|
1025
|
+
"AML.T0054",
|
|
1026
|
+
"AML.T0096"
|
|
1027
|
+
],
|
|
1028
|
+
"attack_refs": [
|
|
1029
|
+
"T1071",
|
|
1030
|
+
"T1078"
|
|
1031
|
+
]
|
|
1032
|
+
},
|
|
1033
|
+
"SLSA-v1.0-Build-L3": {
|
|
1034
|
+
"framework": "SLSA v1.0 (Supply-chain Levels for Software Artifacts) — Build Track",
|
|
1035
|
+
"control_id": "Build L3",
|
|
1036
|
+
"control_name": "Hardened build platform with non-falsifiable provenance",
|
|
1037
|
+
"designed_for": "Build-platform-attested provenance for software artifacts: hosted, hardened, non-forgeable provenance signed by the build platform. Referenced under US EO 14028, cross-walked by EU CRA Annex I (essential cybersecurity requirements) and Cyber Resilience Act SBOM obligations, UK NCSC supply chain guidance, AU ISM supply chain, ISO/IEC 5230 (OpenChain), and in-toto attestations.",
|
|
1038
|
+
"misses": [
|
|
1039
|
+
"AI-generated artifacts — code emitted by Copilot/Cursor/Codex/Claude Code is committed under the human developer's identity; the build platform attests the commit but not the AI origin of the diff",
|
|
1040
|
+
"Model weights provenance — model artifacts (weights, tokenizers, adapter LoRAs) are software but have no SLSA L3-equivalent build attestation; HuggingFace + Civitai distribution is closer to SLSA L0/L1",
|
|
1041
|
+
"Training data manifests have no provenance attestation track in SLSA v1.0",
|
|
1042
|
+
"No cross-walk to EU CRA Annex I requirement for SBOMs covering AI components, UK NCSC AI supply chain, AU ISM AI annex"
|
|
1043
|
+
],
|
|
1044
|
+
"real_requirement": "SLSA must add: (1) AI-authorship attestation layer (per-block provenance for AI-generated code with reviewer identity), (2) a Model Track parallel to the Build Track with L0–L3 maturity for model weight provenance (build environment, training data manifest, fine-tune lineage, signature), (3) explicit SBOM/AI-BOM linkage to satisfy EU CRA, UK NCSC, AU ISM AI annex requirements.",
|
|
1045
|
+
"status": "open",
|
|
1046
|
+
"opened_date": "2026-05-11",
|
|
1047
|
+
"evidence_cves": [
|
|
1048
|
+
"CVE-2025-53773",
|
|
1049
|
+
"CVE-2026-30615"
|
|
1050
|
+
],
|
|
1051
|
+
"atlas_refs": [
|
|
1052
|
+
"AML.T0010",
|
|
1053
|
+
"AML.T0018",
|
|
1054
|
+
"AML.T0020"
|
|
1055
|
+
],
|
|
1056
|
+
"attack_refs": [
|
|
1057
|
+
"T1195.001",
|
|
1058
|
+
"T1195.002"
|
|
1059
|
+
]
|
|
1060
|
+
},
|
|
1061
|
+
"VEX-CSAF-v2.1": {
|
|
1062
|
+
"framework": "VEX via OASIS CSAF 2.1 (Common Security Advisory Framework)",
|
|
1063
|
+
"control_id": "CSAF-2.1-VEX",
|
|
1064
|
+
"control_name": "Vulnerability Exploitability eXchange profile",
|
|
1065
|
+
"designed_for": "Machine-readable supplier statements about vulnerability applicability: not_affected, affected, fixed, under_investigation. Referenced under US CISA SBOM/VEX guidance, EU CRA Annex I (vulnerability handling obligations), UK NCSC vulnerability disclosure, AU ISM patch management, ISO/IEC 29147 (vulnerability disclosure) and 30111 (vulnerability handling).",
|
|
1066
|
+
"misses": [
|
|
1067
|
+
"VEX for AI components — model weights, embedding models, RAG corpora, MCP servers are software but have no CVE-equivalent identifier scheme for which VEX statements would be issued",
|
|
1068
|
+
"Model-as-software supplier statements — when a fine-tuned model inherits a base model jailbreak, there is no VEX statement chain expressing 'this base-model issue is mitigated in this derived model'",
|
|
1069
|
+
"Prompt-injection regressions are not in the CVE namespace and therefore have no VEX expression",
|
|
1070
|
+
"No cross-walk to EU AI Act Art. 15 (cybersecurity of high-risk AI systems) — AI vulnerability disclosure obligations exist with no VEX-equivalent transport"
|
|
1071
|
+
],
|
|
1072
|
+
"real_requirement": "CSAF 2.1 (or a successor profile) must add: (1) an AI-component identifier scheme (model + version + adapters + tokenizer), (2) AI-specific vulnerability classes (jailbreak class, prompt-injection vector, embedding inversion class) with VEX statements, (3) explicit chaining of base-model to derived-model VEX statements, (4) alignment with EU AI Act Art. 15 disclosure obligations, UK NCSC AI vulnerability disclosure, AU ISM AI annex.",
|
|
1073
|
+
"status": "open",
|
|
1074
|
+
"opened_date": "2026-05-11",
|
|
1075
|
+
"evidence_cves": [
|
|
1076
|
+
"CVE-2025-53773",
|
|
1077
|
+
"CVE-2026-30615"
|
|
1078
|
+
],
|
|
1079
|
+
"atlas_refs": [
|
|
1080
|
+
"AML.T0010",
|
|
1081
|
+
"AML.T0018"
|
|
1082
|
+
],
|
|
1083
|
+
"attack_refs": [
|
|
1084
|
+
"T1195.001"
|
|
1085
|
+
]
|
|
1086
|
+
},
|
|
1087
|
+
"CycloneDX-v1.6-SBOM": {
|
|
1088
|
+
"framework": "CycloneDX v1.6 (OWASP SBOM standard)",
|
|
1089
|
+
"control_id": "CycloneDX-v1.6",
|
|
1090
|
+
"control_name": "Software Bill of Materials",
|
|
1091
|
+
"designed_for": "Component inventory for software, services, and (in 1.6) machine-learning models and data. Cross-walks to US EO 14028 + NTIA minimum elements, EU CRA Annex I SBOM requirement, UK NCSC SBOM guidance, AU ISM SBOM/supply-chain controls, and ISO/IEC 5962 (SPDX) for interoperability.",
|
|
1092
|
+
"misses": [
|
|
1093
|
+
"AI-BOM in practice — while CycloneDX 1.6 introduced ML-BOM types, in-the-wild SBOMs rarely include model weights, training data manifests, or RAG corpora as components",
|
|
1094
|
+
"MCP-server inventory is not represented — MCP servers are runtime tool plugins, often installed per-developer, and current SBOM tooling does not enumerate them as components of the deployed application",
|
|
1095
|
+
"Provenance fields exist but are commonly empty for AI components — supplier, version, signature, training-data-source are not populated by upstream model publishers",
|
|
1096
|
+
"No mandated cross-walk between SPDX 3.0 AI extensions and CycloneDX ML-BOM — consumers face dialect divergence under EU CRA Annex I and NIST SSDF reporting"
|
|
1097
|
+
],
|
|
1098
|
+
"real_requirement": "CycloneDX 1.6 deployment must require: (1) ML-BOM completeness checks (model + adapters + tokenizer + training data manifest where licensable), (2) MCP server inventory as part of the application SBOM, (3) populated provenance fields (signature, training data source, supplier) — empty fields treated as a defect, (4) SPDX 3.0 AI cross-walk evidence to satisfy EU CRA Annex I parity.",
|
|
1099
|
+
"status": "open",
|
|
1100
|
+
"opened_date": "2026-05-11",
|
|
1101
|
+
"evidence_cves": [
|
|
1102
|
+
"CVE-2026-30615"
|
|
1103
|
+
],
|
|
1104
|
+
"atlas_refs": [
|
|
1105
|
+
"AML.T0010",
|
|
1106
|
+
"AML.T0018",
|
|
1107
|
+
"AML.T0020"
|
|
1108
|
+
],
|
|
1109
|
+
"attack_refs": [
|
|
1110
|
+
"T1195.001"
|
|
1111
|
+
]
|
|
1112
|
+
},
|
|
1113
|
+
"SPDX-v3.0-SBOM": {
|
|
1114
|
+
"framework": "SPDX v3.0 (ISO/IEC 5962-aligned SBOM standard)",
|
|
1115
|
+
"control_id": "SPDX-v3.0",
|
|
1116
|
+
"control_name": "Software Package Data Exchange — SBOM",
|
|
1117
|
+
"designed_for": "Component, licence, security, and (in 3.0) AI/Dataset profile inventory. Referenced under US EO 14028, EU CRA Annex I SBOM obligation, UK NCSC SBOM guidance, AU ISM, and aligned to ISO/IEC 5962 for international cross-walk.",
|
|
1118
|
+
"misses": [
|
|
1119
|
+
"Same gaps as CycloneDX 1.6 — AI Profile and Dataset Profile exist in SPDX 3.0 but are rarely populated by upstream model publishers; missing-by-default is the norm",
|
|
1120
|
+
"MCP server / AI tool plugin inventory is not modelled distinctly from generic packages",
|
|
1121
|
+
"No mandated cross-walk to CycloneDX 1.6 ML-BOM — consumers face dialect divergence",
|
|
1122
|
+
"Provenance fields for training datasets are often blocked by licensing opacity, with no SPDX requirement to declare opacity explicitly"
|
|
1123
|
+
],
|
|
1124
|
+
"real_requirement": "SPDX 3.0 deployment must require: (1) AI Profile + Dataset Profile completeness checks, (2) explicit declaration when training dataset provenance is unavailable (opacity flag), (3) MCP server inventory as a named SPDX element type, (4) CycloneDX ML-BOM cross-walk evidence — maintained as a cross-walk peer rather than a substitute. Aligns with EU CRA Annex I and ISO/IEC 5962.",
|
|
1125
|
+
"status": "open",
|
|
1126
|
+
"opened_date": "2026-05-11",
|
|
1127
|
+
"evidence_cves": [
|
|
1128
|
+
"CVE-2026-30615"
|
|
1129
|
+
],
|
|
1130
|
+
"atlas_refs": [
|
|
1131
|
+
"AML.T0010",
|
|
1132
|
+
"AML.T0018",
|
|
1133
|
+
"AML.T0020"
|
|
1134
|
+
],
|
|
1135
|
+
"attack_refs": [
|
|
1136
|
+
"T1195.001"
|
|
1137
|
+
]
|
|
1138
|
+
},
|
|
1139
|
+
"OWASP-Pen-Testing-Guide-v5": {
|
|
1140
|
+
"framework": "OWASP Web Security Testing Guide v5 (WSTG)",
|
|
1141
|
+
"control_id": "WSTG-v5",
|
|
1142
|
+
"control_name": "Web application penetration testing methodology",
|
|
1143
|
+
"designed_for": "Web application pen testing methodology used as a baseline cross-walk under PCI DSS Req. 11.4, ISO 27001:2022 A.8.29 (security testing in development and acceptance), NIST SP 800-115, UK NCSC CHECK / CREST, AU IRAP, and EU DORA Art. 24 (TLPT and testing).",
|
|
1144
|
+
"misses": [
|
|
1145
|
+
"AI-API pen testing methodology — no WSTG-v5 chapter addresses prompt injection, jailbreak, model-DoS, embedding inversion, or AI-API-as-C2 testing as named test classes",
|
|
1146
|
+
"MCP server pen testing — supply-chain-attack testing on AI tool plugins is not covered; the WSTG threat model predates MCP",
|
|
1147
|
+
"Indirect prompt injection via PR descriptions, RAG corpora, web content is not a named WSTG test",
|
|
1148
|
+
"No cross-walk to PTES, NIST 800-115, EU DORA TLPT, UK CHECK/CREST, or AU IRAP for AI-augmented test scoping"
|
|
1149
|
+
],
|
|
1150
|
+
"real_requirement": "WSTG v5 must add: (1) AI-API test class (prompt injection, jailbreak, model-DoS, embedding inversion, AI-API-as-C2 indicators), (2) MCP server test class (supply chain, tool-response injection, signature verification, allowlist bypass), (3) indirect prompt injection test methodology with named corpora (PR descriptions, web pages, ingest pipelines), (4) cross-walk to PTES, NIST 800-115, EU DORA TLPT, UK CHECK/CREST, AU IRAP.",
|
|
1151
|
+
"status": "open",
|
|
1152
|
+
"opened_date": "2026-05-11",
|
|
1153
|
+
"evidence_cves": [
|
|
1154
|
+
"CVE-2025-53773",
|
|
1155
|
+
"CVE-2026-30615"
|
|
1156
|
+
],
|
|
1157
|
+
"atlas_refs": [
|
|
1158
|
+
"AML.T0010",
|
|
1159
|
+
"AML.T0043",
|
|
1160
|
+
"AML.T0051",
|
|
1161
|
+
"AML.T0054",
|
|
1162
|
+
"AML.T0096"
|
|
1163
|
+
],
|
|
1164
|
+
"attack_refs": [
|
|
1165
|
+
"T1195.001",
|
|
1166
|
+
"T1059",
|
|
1167
|
+
"T1071"
|
|
1168
|
+
]
|
|
1169
|
+
},
|
|
1170
|
+
"PTES-Pre-engagement": {
|
|
1171
|
+
"framework": "Penetration Testing Execution Standard (PTES)",
|
|
1172
|
+
"control_id": "PTES-Pre-engagement",
|
|
1173
|
+
"control_name": "Pre-engagement Interactions",
|
|
1174
|
+
"designed_for": "Engagement scoping, rules of engagement, and authorisation framework for penetration tests. Cross-walks to NIST SP 800-115, ISO 27001:2022 A.8.29, UK NCSC CHECK / CREST scoping, AU IRAP penetration testing, and EU DORA Art. 24 (Threat-Led Penetration Testing / TIBER-EU).",
|
|
1175
|
+
"misses": [
|
|
1176
|
+
"AI/MCP scoping language — pre-engagement templates do not enumerate AI APIs, AI assistants, MCP servers, RAG pipelines, or agent tool inventories as in-scope asset classes",
|
|
1177
|
+
"No standard authorisation language for testing prompt-injection on third-party AI providers (and the contractual constraints providers impose on adversarial testing)",
|
|
1178
|
+
"Rules of engagement do not address out-of-band data exfiltration via the AI provider as part of the test path",
|
|
1179
|
+
"No cross-walk to EU DORA TLPT / TIBER-EU scoping templates for AI-augmented financial services testing"
|
|
1180
|
+
],
|
|
1181
|
+
"real_requirement": "PTES Pre-engagement must add: (1) named AI/MCP asset classes in the standard scoping checklist, (2) provider-side authorisation guidance and contractual carve-outs for prompt-injection testing, (3) rules-of-engagement language addressing AI-API egress as a potential exfiltration channel during the test, (4) cross-walk to TIBER-EU / DORA Art. 24 / UK CBEST / AU CORIE scoping for AI-augmented financial services TLPT.",
|
|
1182
|
+
"status": "open",
|
|
1183
|
+
"opened_date": "2026-05-11",
|
|
1184
|
+
"evidence_cves": [
|
|
1185
|
+
"CVE-2025-53773",
|
|
1186
|
+
"CVE-2026-30615"
|
|
1187
|
+
],
|
|
1188
|
+
"atlas_refs": [
|
|
1189
|
+
"AML.T0010",
|
|
1190
|
+
"AML.T0051",
|
|
1191
|
+
"AML.T0096"
|
|
1192
|
+
],
|
|
1193
|
+
"attack_refs": [
|
|
1194
|
+
"T1195.001",
|
|
1195
|
+
"T1071"
|
|
1196
|
+
]
|
|
1197
|
+
},
|
|
1198
|
+
"NIST-800-115": {
|
|
1199
|
+
"framework": "NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)",
|
|
1200
|
+
"control_id": "800-115",
|
|
1201
|
+
"control_name": "Technical Guide to Information Security Testing and Assessment",
|
|
1202
|
+
"designed_for": "Technical methodology for information security testing — review techniques, target identification, vulnerability validation, and reporting. Cross-walks to PCI DSS Req. 11.4, ISO 27001:2022 A.8.29, EU DORA Art. 24, UK NCSC CHECK / CREST, AU IRAP, OWASP WSTG, and PTES.",
|
|
1203
|
+
"misses": [
|
|
1204
|
+
"AI-API testing techniques — 800-115 enumerates network, application, and wireless techniques; AI-API surface is not a named test class",
|
|
1205
|
+
"Fuzz testing as compliance evidence — 800-115 references fuzzing as a technique but does not require it as evidence under any compliance regime (and prompt-fuzzing for AI APIs is absent)",
|
|
1206
|
+
"No methodology for testing AI-API-as-C2, prompt-injection RCE in developer tooling, or MCP server trust",
|
|
1207
|
+
"No cross-walk to EU AI Act Art. 15 (cybersecurity of high-risk AI systems) testing obligations"
|
|
1208
|
+
],
|
|
1209
|
+
"real_requirement": "800-115 must add: (1) AI-API testing chapter with techniques for prompt injection, jailbreak, model-DoS, embedding inversion, AI-API-as-C2, (2) prompt-fuzzing methodology with evidence retention guidance, (3) MCP server test class, (4) explicit compliance cross-walk: under what regimes (PCI 11.4, DORA Art. 24, EU AI Act Art. 15, UK CHECK, AU IRAP) is which test class required.",
|
|
1210
|
+
"status": "open",
|
|
1211
|
+
"opened_date": "2026-05-11",
|
|
1212
|
+
"evidence_cves": [
|
|
1213
|
+
"CVE-2025-53773",
|
|
1214
|
+
"CVE-2026-30615"
|
|
1215
|
+
],
|
|
1216
|
+
"atlas_refs": [
|
|
1217
|
+
"AML.T0010",
|
|
1218
|
+
"AML.T0043",
|
|
1219
|
+
"AML.T0051",
|
|
1220
|
+
"AML.T0054",
|
|
1221
|
+
"AML.T0096"
|
|
1222
|
+
],
|
|
1223
|
+
"attack_refs": [
|
|
1224
|
+
"T1059",
|
|
1225
|
+
"T1071",
|
|
1226
|
+
"T1195.001"
|
|
1227
|
+
]
|
|
1228
|
+
},
|
|
1229
|
+
"CWE-Top-25-2024-meta": {
|
|
1230
|
+
"framework": "CWE Top 25 Most Dangerous Software Weaknesses (2024 list)",
|
|
1231
|
+
"control_id": "CWE-Top-25-2024-meta",
|
|
1232
|
+
"control_name": "Meta-control: have you addressed the CWE Top 25?",
|
|
1233
|
+
"designed_for": "MITRE/CISA-curated annual list of the most dangerous software weaknesses by observed real-world impact. Used as a baseline cross-walk under NIST SSDF (PW.4 / PW.5), OWASP ASVS, PCI DSS Req. 6, ISO 27001:2022 A.8.28 (secure coding), EU CRA Annex I (essential cybersecurity requirements), UK NCSC Secure Development & Deployment, and AU ISM.",
|
|
1234
|
+
"misses": [
|
|
1235
|
+
"CWE-1426 (Improper Validation of Generative AI Output) is in the CWE corpus but not in the 2024 Top 25 — it should be addressed even though the meta-control 'address the Top 25' does not surface it",
|
|
1236
|
+
"AI-relevant CWEs are under-represented relative to real-world AI incident frequency in 2025-2026 — Top 25 lags AI-incident telemetry",
|
|
1237
|
+
"Treating 'Top 25 addressed' as a compliance signal creates a compliance-theatre risk for organisations with significant AI surface",
|
|
1238
|
+
"No cross-walk requirement to ATLAS TTPs — CWE addresses weaknesses; ATLAS addresses adversary techniques. Both are needed for AI coverage"
|
|
1239
|
+
],
|
|
1240
|
+
"real_requirement": "Programmes that claim 'Top 25 addressed' as compliance evidence must additionally: (1) enumerate AI-relevant CWEs outside the Top 25 (CWE-1426 Improper Output Validation, CWE-1039 Inadequate Detection of Adversarial Input, CWE-1230 Exposure of Sensitive Info Through Metadata) with explicit treatment, (2) cross-walk to ATLAS v5.1.0 TTPs for adversarial coverage, (3) re-baseline against the next-published Top 25 with delta analysis. Aligns with EU CRA Annex I, UK NCSC, AU ISM, ISO 27001 A.8.28.",
|
|
1241
|
+
"status": "open",
|
|
1242
|
+
"opened_date": "2026-05-11",
|
|
1243
|
+
"evidence_cves": [
|
|
1244
|
+
"CVE-2025-53773"
|
|
1245
|
+
],
|
|
1246
|
+
"atlas_refs": [
|
|
1247
|
+
"AML.T0043",
|
|
1248
|
+
"AML.T0051",
|
|
1249
|
+
"AML.T0054"
|
|
1250
|
+
],
|
|
1251
|
+
"attack_refs": [
|
|
1252
|
+
"T1059"
|
|
1253
|
+
]
|
|
1254
|
+
}
|
|
1255
|
+
}
|