@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
|
@@ -0,0 +1,324 @@
|
|
|
1
|
+
{
|
|
2
|
+
"_meta": {
|
|
3
|
+
"schema_version": "1.0.0",
|
|
4
|
+
"last_updated": "2026-05-11",
|
|
5
|
+
"note": "IETF RFCs and Internet-Drafts that exceptd skills depend on. RFCs are the layer beneath compliance frameworks: a control like 'TLS 1.3 required' implicitly references RFC 8446; a 'use strong KEM' control depends on whatever draft-ietf-tls-ecdhe-mlkem settles into. Frameworks lag RFCs; RFCs lag attacker innovation. This catalog tracks both kinds of lag.",
|
|
6
|
+
"status_values": [
|
|
7
|
+
"Internet Standard",
|
|
8
|
+
"Proposed Standard",
|
|
9
|
+
"Best Current Practice",
|
|
10
|
+
"Informational",
|
|
11
|
+
"Experimental",
|
|
12
|
+
"Historic",
|
|
13
|
+
"Draft"
|
|
14
|
+
],
|
|
15
|
+
"skill_refs_field": "rfc_refs",
|
|
16
|
+
"tlp": "CLEAR",
|
|
17
|
+
"source_confidence": {
|
|
18
|
+
"scheme": "Admiralty (A-F + 1-6)",
|
|
19
|
+
"default": "A1",
|
|
20
|
+
"note": "B = usually reliable; 2 = probably true. Per-entry overrides via entry-level source_confidence field. Public-record catalogs (NVD, ATLAS, CWE, RFC, framework publishers) get A1 (completely reliable, confirmed). Project-curated catalogs (zeroday-lessons, exploit-availability) default to B2 with source citations."
|
|
21
|
+
},
|
|
22
|
+
"freshness_policy": {
|
|
23
|
+
"default_review_cadence_days": 90,
|
|
24
|
+
"stale_after_days": 180,
|
|
25
|
+
"rebuild_after_days": 365,
|
|
26
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
27
|
+
}
|
|
28
|
+
},
|
|
29
|
+
"RFC-8446": {
|
|
30
|
+
"number": 8446,
|
|
31
|
+
"title": "The Transport Layer Security (TLS) Protocol Version 1.3",
|
|
32
|
+
"status": "Proposed Standard",
|
|
33
|
+
"published": "2018-08",
|
|
34
|
+
"replaces": [
|
|
35
|
+
"RFC-5246"
|
|
36
|
+
],
|
|
37
|
+
"errata_count": 39,
|
|
38
|
+
"tracker": "https://www.rfc-editor.org/info/rfc8446",
|
|
39
|
+
"relevance": "TLS 1.3 is the baseline assumption for every AI provider egress channel, every MCP HTTP transport, and every kernel-userspace TLS exchange. Skills that analyze boundary inspection, cert pinning, or AI-API C2 detection must ground in this RFC.",
|
|
40
|
+
"lag_notes": "RFC 8446 alone is not PQC-ready. Hybrid PQC drafts (draft-ietf-tls-ecdhe-mlkem, draft-ietf-tls-hybrid-design) layer on top — see those entries.",
|
|
41
|
+
"skills_referencing": [
|
|
42
|
+
"ai-c2-detection",
|
|
43
|
+
"api-security",
|
|
44
|
+
"cloud-security",
|
|
45
|
+
"container-runtime-security",
|
|
46
|
+
"dlp-gap-analysis",
|
|
47
|
+
"mcp-agent-trust",
|
|
48
|
+
"pqc-first",
|
|
49
|
+
"sector-federal-government",
|
|
50
|
+
"sector-financial",
|
|
51
|
+
"webapp-security"
|
|
52
|
+
],
|
|
53
|
+
"last_verified": "2026-05-11"
|
|
54
|
+
},
|
|
55
|
+
"DRAFT-IETF-TLS-ECDHE-MLKEM": {
|
|
56
|
+
"number": null,
|
|
57
|
+
"draft_id": "draft-ietf-tls-ecdhe-mlkem",
|
|
58
|
+
"title": "Post-Quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3",
|
|
59
|
+
"status": "Draft",
|
|
60
|
+
"published": "in flight as of 2026-05",
|
|
61
|
+
"tracker": "https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/",
|
|
62
|
+
"relevance": "Defines X25519+ML-KEM-768 and similar hybrid groups for TLS 1.3 — the operational path for PQC migration without rip-and-replace. Pinned in pqc-first as the recommended hybrid posture.",
|
|
63
|
+
"lag_notes": "Still a draft as of mid-2026. OpenSSL 3.5+ ships the hybrid groups under provisional codepoints. Final RFC number TBD on WG consensus.",
|
|
64
|
+
"skills_referencing": [
|
|
65
|
+
"pqc-first"
|
|
66
|
+
],
|
|
67
|
+
"last_verified": "2026-05-11"
|
|
68
|
+
},
|
|
69
|
+
"DRAFT-IETF-TLS-HYBRID-DESIGN": {
|
|
70
|
+
"number": null,
|
|
71
|
+
"draft_id": "draft-ietf-tls-hybrid-design",
|
|
72
|
+
"title": "Hybrid key exchange in TLS 1.3",
|
|
73
|
+
"status": "Draft",
|
|
74
|
+
"tracker": "https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design/",
|
|
75
|
+
"relevance": "General-purpose hybrid-KEM design that the ecdhe-mlkem draft instantiates. Operators evaluating the migration story should read both.",
|
|
76
|
+
"lag_notes": "Companion draft. Status synchronized with draft-ietf-tls-ecdhe-mlkem.",
|
|
77
|
+
"skills_referencing": [
|
|
78
|
+
"pqc-first"
|
|
79
|
+
],
|
|
80
|
+
"last_verified": "2026-05-11"
|
|
81
|
+
},
|
|
82
|
+
"RFC-9180": {
|
|
83
|
+
"number": 9180,
|
|
84
|
+
"title": "Hybrid Public Key Encryption",
|
|
85
|
+
"status": "Informational",
|
|
86
|
+
"published": "2022-02",
|
|
87
|
+
"errata_count": 12,
|
|
88
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9180",
|
|
89
|
+
"relevance": "HPKE is the substrate for TLS ECH, MLS, Oblivious HTTP, and several emerging covert-channel scenarios in AI-API C2 detection. PQC composition discussions for HPKE are ongoing at IETF.",
|
|
90
|
+
"lag_notes": "RFC 9180 is classical-only. PQC HPKE is being worked at IETF CFRG; expect draft updates through 2026-2027.",
|
|
91
|
+
"skills_referencing": [
|
|
92
|
+
"ai-c2-detection",
|
|
93
|
+
"cloud-security",
|
|
94
|
+
"pqc-first"
|
|
95
|
+
],
|
|
96
|
+
"last_verified": "2026-05-11"
|
|
97
|
+
},
|
|
98
|
+
"RFC-9458": {
|
|
99
|
+
"number": 9458,
|
|
100
|
+
"title": "Oblivious HTTP",
|
|
101
|
+
"status": "Proposed Standard",
|
|
102
|
+
"published": "2024-01",
|
|
103
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9458",
|
|
104
|
+
"relevance": "Oblivious HTTP is a published-standard covert-channel candidate for AI-API C2: requests are encrypted to a relay so the destination sees no client identity. Boundary inspection cannot distinguish OHTTP-wrapped AI traffic from any other HTTPS traffic to the relay endpoint.",
|
|
105
|
+
"lag_notes": "Standard published; enterprise SC-7 boundary tooling vendors are 12-18 months behind on detection guidance. AI-c2-detection skill operationalizes the gap.",
|
|
106
|
+
"skills_referencing": [
|
|
107
|
+
"ai-c2-detection",
|
|
108
|
+
"dlp-gap-analysis"
|
|
109
|
+
],
|
|
110
|
+
"last_verified": "2026-05-11"
|
|
111
|
+
},
|
|
112
|
+
"RFC-9421": {
|
|
113
|
+
"number": 9421,
|
|
114
|
+
"title": "HTTP Message Signatures",
|
|
115
|
+
"status": "Proposed Standard",
|
|
116
|
+
"published": "2024-02",
|
|
117
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9421",
|
|
118
|
+
"relevance": "Per-request signing of HTTP messages — relevant for MCP server-to-agent attestation and for AI provider abuse-signal subscriptions. AI providers increasingly use HTTP Message Signatures for webhook authenticity.",
|
|
119
|
+
"lag_notes": "Standard published; AI-provider adoption is uneven. MCP spec does not yet mandate it.",
|
|
120
|
+
"skills_referencing": [
|
|
121
|
+
"ai-c2-detection",
|
|
122
|
+
"api-security",
|
|
123
|
+
"mcp-agent-trust",
|
|
124
|
+
"sector-financial",
|
|
125
|
+
"sector-healthcare"
|
|
126
|
+
],
|
|
127
|
+
"last_verified": "2026-05-11"
|
|
128
|
+
},
|
|
129
|
+
"RFC-9114": {
|
|
130
|
+
"number": 9114,
|
|
131
|
+
"title": "HTTP/3",
|
|
132
|
+
"status": "Proposed Standard",
|
|
133
|
+
"published": "2022-06",
|
|
134
|
+
"errata_count": 7,
|
|
135
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9114",
|
|
136
|
+
"relevance": "AI providers increasingly serve over HTTP/3 (QUIC). Boundary tools that rely on TLS termination + HTTP/1.1 / HTTP/2 inspection cannot apply to HTTP/3 without QUIC-aware probes. Detection gap for ai-c2-detection.",
|
|
137
|
+
"lag_notes": "Standard well-deployed; enterprise next-gen-firewall HTTP/3 inspection coverage as of mid-2026 remains uneven.",
|
|
138
|
+
"skills_referencing": [
|
|
139
|
+
"ai-c2-detection",
|
|
140
|
+
"api-security",
|
|
141
|
+
"mcp-agent-trust",
|
|
142
|
+
"webapp-security"
|
|
143
|
+
],
|
|
144
|
+
"last_verified": "2026-05-11"
|
|
145
|
+
},
|
|
146
|
+
"RFC-9000": {
|
|
147
|
+
"number": 9000,
|
|
148
|
+
"title": "QUIC: A UDP-Based Multiplexed and Secure Transport",
|
|
149
|
+
"status": "Proposed Standard",
|
|
150
|
+
"published": "2021-05",
|
|
151
|
+
"errata_count": 25,
|
|
152
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9000",
|
|
153
|
+
"relevance": "QUIC is the transport beneath HTTP/3 and beneath several emerging AI inference APIs that need low-latency streaming. SC-7 boundary tools historically assume TCP for HTTPS — QUIC over UDP requires explicit detection rules.",
|
|
154
|
+
"skills_referencing": [
|
|
155
|
+
"ai-c2-detection"
|
|
156
|
+
],
|
|
157
|
+
"last_verified": "2026-05-11"
|
|
158
|
+
},
|
|
159
|
+
"RFC-7519": {
|
|
160
|
+
"number": 7519,
|
|
161
|
+
"title": "JSON Web Token (JWT)",
|
|
162
|
+
"status": "Proposed Standard",
|
|
163
|
+
"published": "2015-05",
|
|
164
|
+
"errata_count": 25,
|
|
165
|
+
"tracker": "https://www.rfc-editor.org/info/rfc7519",
|
|
166
|
+
"relevance": "JWT is the dominant bearer-token format for MCP server auth, AI-provider API auth, and OAuth 2.0 access tokens (RFC 9068). mcp-agent-trust analyses signer trust, audience validation, and the alg=none / kid-confusion attack classes.",
|
|
167
|
+
"lag_notes": "RFC 7519 is the spec; RFC 8725 (Best Current Practices) is what implementations should follow. Many MCP servers still hand-roll JWT validation and miss BCP 225 guidance.",
|
|
168
|
+
"skills_referencing": [
|
|
169
|
+
"api-security",
|
|
170
|
+
"cloud-security",
|
|
171
|
+
"identity-assurance",
|
|
172
|
+
"mcp-agent-trust",
|
|
173
|
+
"sector-financial",
|
|
174
|
+
"sector-healthcare",
|
|
175
|
+
"webapp-security"
|
|
176
|
+
],
|
|
177
|
+
"last_verified": "2026-05-11"
|
|
178
|
+
},
|
|
179
|
+
"RFC-8725": {
|
|
180
|
+
"number": 8725,
|
|
181
|
+
"title": "JSON Web Token Best Current Practices",
|
|
182
|
+
"status": "Best Current Practice",
|
|
183
|
+
"published": "2020-02",
|
|
184
|
+
"errata_count": 4,
|
|
185
|
+
"tracker": "https://www.rfc-editor.org/info/rfc8725",
|
|
186
|
+
"relevance": "BCP 225. Required reading for any MCP / agent / AI-API auth implementation. Covers algorithm-confusion attacks, kid traversal, audience pinning. mcp-agent-trust uses this as the JWT-handling baseline.",
|
|
187
|
+
"skills_referencing": [
|
|
188
|
+
"api-security",
|
|
189
|
+
"cloud-security",
|
|
190
|
+
"identity-assurance",
|
|
191
|
+
"mcp-agent-trust",
|
|
192
|
+
"sector-financial",
|
|
193
|
+
"webapp-security"
|
|
194
|
+
],
|
|
195
|
+
"last_verified": "2026-05-11"
|
|
196
|
+
},
|
|
197
|
+
"RFC-6749": {
|
|
198
|
+
"number": 6749,
|
|
199
|
+
"title": "The OAuth 2.0 Authorization Framework",
|
|
200
|
+
"status": "Proposed Standard",
|
|
201
|
+
"published": "2012-10",
|
|
202
|
+
"errata_count": 33,
|
|
203
|
+
"tracker": "https://www.rfc-editor.org/info/rfc6749",
|
|
204
|
+
"relevance": "OAuth 2.0 underpins MCP server-to-client auth in production deployments. RFC 9700 (OAuth 2.0 Security BCP) is the operational reference.",
|
|
205
|
+
"skills_referencing": [
|
|
206
|
+
"api-security",
|
|
207
|
+
"identity-assurance",
|
|
208
|
+
"mcp-agent-trust"
|
|
209
|
+
],
|
|
210
|
+
"last_verified": "2026-05-11"
|
|
211
|
+
},
|
|
212
|
+
"RFC-9700": {
|
|
213
|
+
"number": 9700,
|
|
214
|
+
"title": "Best Current Practice for OAuth 2.0 Security",
|
|
215
|
+
"status": "Best Current Practice",
|
|
216
|
+
"published": "2025-01",
|
|
217
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9700",
|
|
218
|
+
"relevance": "Replaces the older RFC 6819 threat model. MCP / agent OAuth implementations should track this BCP, not the original RFC 6749 alone.",
|
|
219
|
+
"lag_notes": "Published 2025-01. Enterprise IAM tooling is still catching up.",
|
|
220
|
+
"skills_referencing": [
|
|
221
|
+
"api-security",
|
|
222
|
+
"identity-assurance",
|
|
223
|
+
"mcp-agent-trust"
|
|
224
|
+
],
|
|
225
|
+
"last_verified": "2026-05-11"
|
|
226
|
+
},
|
|
227
|
+
"RFC-8032": {
|
|
228
|
+
"number": 8032,
|
|
229
|
+
"title": "Edwards-Curve Digital Signature Algorithm (EdDSA)",
|
|
230
|
+
"status": "Informational",
|
|
231
|
+
"published": "2017-01",
|
|
232
|
+
"errata_count": 8,
|
|
233
|
+
"tracker": "https://www.rfc-editor.org/info/rfc8032",
|
|
234
|
+
"relevance": "Ed25519 / Ed448. exceptd itself uses Ed25519 for skill integrity signing (AGENTS.md hard rule #13, lib/sign.js). Not PQC-safe; pqc-first tracks the SLH-DSA / ML-DSA migration path for signature surfaces.",
|
|
235
|
+
"skills_referencing": [
|
|
236
|
+
"container-runtime-security",
|
|
237
|
+
"identity-assurance",
|
|
238
|
+
"mlops-security",
|
|
239
|
+
"pqc-first",
|
|
240
|
+
"sector-federal-government",
|
|
241
|
+
"supply-chain-integrity"
|
|
242
|
+
],
|
|
243
|
+
"last_verified": "2026-05-11"
|
|
244
|
+
},
|
|
245
|
+
"RFC-9106": {
|
|
246
|
+
"number": 9106,
|
|
247
|
+
"title": "Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work",
|
|
248
|
+
"status": "Informational",
|
|
249
|
+
"published": "2021-09",
|
|
250
|
+
"errata_count": 3,
|
|
251
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9106",
|
|
252
|
+
"relevance": "Argon2id is the memory-hard KDF baseline for password hashing in any system that exceptd operators deploy. Not directly PQC-relevant (it's a one-way function, not a public-key primitive) but pqc-first tracks crypto migration generally.",
|
|
253
|
+
"skills_referencing": [
|
|
254
|
+
"pqc-first"
|
|
255
|
+
],
|
|
256
|
+
"last_verified": "2026-05-11"
|
|
257
|
+
},
|
|
258
|
+
"RFC-4301": {
|
|
259
|
+
"number": 4301,
|
|
260
|
+
"title": "Security Architecture for the Internet Protocol",
|
|
261
|
+
"status": "Proposed Standard",
|
|
262
|
+
"published": "2005-12",
|
|
263
|
+
"errata_count": 11,
|
|
264
|
+
"tracker": "https://www.rfc-editor.org/info/rfc4301",
|
|
265
|
+
"relevance": "IPsec architecture. CVE-2026-43284 (Dirty Frag) exploits an implementation bug in the Linux kernel's IPsec ESP path; the spec layer is RFC 4301 + RFC 4303. Framework controls like NIST 800-53 SC-8 implicitly cite this RFC family without operationalizing the kernel-implementation gap.",
|
|
266
|
+
"skills_referencing": [
|
|
267
|
+
"kernel-lpe-triage"
|
|
268
|
+
],
|
|
269
|
+
"last_verified": "2026-05-11"
|
|
270
|
+
},
|
|
271
|
+
"RFC-4303": {
|
|
272
|
+
"number": 4303,
|
|
273
|
+
"title": "IP Encapsulating Security Payload (ESP)",
|
|
274
|
+
"status": "Proposed Standard",
|
|
275
|
+
"published": "2005-12",
|
|
276
|
+
"errata_count": 7,
|
|
277
|
+
"tracker": "https://www.rfc-editor.org/info/rfc4303",
|
|
278
|
+
"relevance": "ESP — the specific IPsec datagram format exploited by Dirty Frag (CVE-2026-43284). Spec compliance does not imply implementation safety; the kernel-lpe-triage skill operationalizes the gap.",
|
|
279
|
+
"skills_referencing": [
|
|
280
|
+
"kernel-lpe-triage"
|
|
281
|
+
],
|
|
282
|
+
"last_verified": "2026-05-11"
|
|
283
|
+
},
|
|
284
|
+
"RFC-7296": {
|
|
285
|
+
"number": 7296,
|
|
286
|
+
"title": "Internet Key Exchange Protocol Version 2 (IKEv2)",
|
|
287
|
+
"status": "Internet Standard",
|
|
288
|
+
"published": "2014-10",
|
|
289
|
+
"std_number": 79,
|
|
290
|
+
"errata_count": 19,
|
|
291
|
+
"tracker": "https://www.rfc-editor.org/info/rfc7296",
|
|
292
|
+
"relevance": "IKEv2 sets up IPsec SAs. Configuration mistakes here surface as SI-7 / SC-8 audit findings without indicating the kernel-side implementation reality. Referenced by kernel-lpe-triage when scoping the Dirty Frag blast radius.",
|
|
293
|
+
"skills_referencing": [
|
|
294
|
+
"kernel-lpe-triage"
|
|
295
|
+
],
|
|
296
|
+
"last_verified": "2026-05-11"
|
|
297
|
+
},
|
|
298
|
+
"RFC-9420": {
|
|
299
|
+
"number": 9420,
|
|
300
|
+
"title": "The Messaging Layer Security (MLS) Protocol",
|
|
301
|
+
"status": "Proposed Standard",
|
|
302
|
+
"published": "2023-07",
|
|
303
|
+
"errata_count": 5,
|
|
304
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9420",
|
|
305
|
+
"relevance": "MLS provides group-key agreement for E2E messaging. Used by some AI agent group-chat systems (multi-agent coordination over E2E channels). PQC migration path is via the same hybrid-KEM approach as TLS.",
|
|
306
|
+
"lag_notes": "Standard published; MLS PQC composition is being worked at IETF CFRG.",
|
|
307
|
+
"skills_referencing": [
|
|
308
|
+
"pqc-first"
|
|
309
|
+
],
|
|
310
|
+
"last_verified": "2026-05-11"
|
|
311
|
+
},
|
|
312
|
+
"RFC-9794": {
|
|
313
|
+
"number": 9794,
|
|
314
|
+
"title": "Terminology for Post-Quantum Cryptography",
|
|
315
|
+
"status": "Informational",
|
|
316
|
+
"published": "2025-09",
|
|
317
|
+
"tracker": "https://www.rfc-editor.org/info/rfc9794",
|
|
318
|
+
"relevance": "Reference terminology for PQC discussions. Cited by every IETF working group document touching PQC. Operators reading the various drafts should anchor on this terminology.",
|
|
319
|
+
"skills_referencing": [
|
|
320
|
+
"pqc-first"
|
|
321
|
+
],
|
|
322
|
+
"last_verified": "2026-05-11"
|
|
323
|
+
}
|
|
324
|
+
}
|