@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
|
@@ -0,0 +1,1833 @@
|
|
|
1
|
+
{
|
|
2
|
+
"_comment": "Auto-generated by scripts/refresh-manifest-snapshot.js — do not hand-edit. Public skill surface used by check-manifest-snapshot.js to detect breaking removals.",
|
|
3
|
+
"_generated_at": "2026-05-11T23:30:00.566Z",
|
|
4
|
+
"atlas_version": "5.1.0",
|
|
5
|
+
"skill_count": 38,
|
|
6
|
+
"skills": [
|
|
7
|
+
{
|
|
8
|
+
"name": "age-gates-child-safety",
|
|
9
|
+
"version": "1.0.0",
|
|
10
|
+
"triggers": [
|
|
11
|
+
"age assurance",
|
|
12
|
+
"age gate",
|
|
13
|
+
"age gates",
|
|
14
|
+
"age verification",
|
|
15
|
+
"california aadc",
|
|
16
|
+
"child online safety",
|
|
17
|
+
"child safety",
|
|
18
|
+
"children's code",
|
|
19
|
+
"children's online safety",
|
|
20
|
+
"cipa",
|
|
21
|
+
"coppa",
|
|
22
|
+
"csam",
|
|
23
|
+
"dsa article 28",
|
|
24
|
+
"esafety",
|
|
25
|
+
"gdpr article 8",
|
|
26
|
+
"kosa",
|
|
27
|
+
"ofcom",
|
|
28
|
+
"parental consent",
|
|
29
|
+
"uk online safety act"
|
|
30
|
+
],
|
|
31
|
+
"data_deps": [
|
|
32
|
+
"atlas-ttps.json",
|
|
33
|
+
"cve-catalog.json",
|
|
34
|
+
"cwe-catalog.json",
|
|
35
|
+
"d3fend-catalog.json",
|
|
36
|
+
"dlp-controls.json",
|
|
37
|
+
"framework-control-gaps.json",
|
|
38
|
+
"global-frameworks.json"
|
|
39
|
+
],
|
|
40
|
+
"atlas_refs": [],
|
|
41
|
+
"attack_refs": [
|
|
42
|
+
"T1078",
|
|
43
|
+
"T1567"
|
|
44
|
+
],
|
|
45
|
+
"framework_gaps": [
|
|
46
|
+
"ISO-27001-2022-A.8.30",
|
|
47
|
+
"NIST-800-53-AC-2",
|
|
48
|
+
"SOC2-CC6-logical-access"
|
|
49
|
+
],
|
|
50
|
+
"rfc_refs": [],
|
|
51
|
+
"cwe_refs": [
|
|
52
|
+
"CWE-200",
|
|
53
|
+
"CWE-287",
|
|
54
|
+
"CWE-862"
|
|
55
|
+
],
|
|
56
|
+
"d3fend_refs": [],
|
|
57
|
+
"dlp_refs": []
|
|
58
|
+
},
|
|
59
|
+
{
|
|
60
|
+
"name": "ai-attack-surface",
|
|
61
|
+
"version": "1.0.0",
|
|
62
|
+
"triggers": [
|
|
63
|
+
"ai attack surface",
|
|
64
|
+
"ai red team",
|
|
65
|
+
"ai security assessment",
|
|
66
|
+
"ai threat model",
|
|
67
|
+
"llm security",
|
|
68
|
+
"model security",
|
|
69
|
+
"prompt injection",
|
|
70
|
+
"promptflux",
|
|
71
|
+
"promptsteal"
|
|
72
|
+
],
|
|
73
|
+
"data_deps": [
|
|
74
|
+
"atlas-ttps.json",
|
|
75
|
+
"cve-catalog.json",
|
|
76
|
+
"framework-control-gaps.json"
|
|
77
|
+
],
|
|
78
|
+
"atlas_refs": [
|
|
79
|
+
"AML.T0016",
|
|
80
|
+
"AML.T0017",
|
|
81
|
+
"AML.T0018",
|
|
82
|
+
"AML.T0020",
|
|
83
|
+
"AML.T0043",
|
|
84
|
+
"AML.T0051",
|
|
85
|
+
"AML.T0054",
|
|
86
|
+
"AML.T0096"
|
|
87
|
+
],
|
|
88
|
+
"attack_refs": [
|
|
89
|
+
"T1059",
|
|
90
|
+
"T1190",
|
|
91
|
+
"T1566"
|
|
92
|
+
],
|
|
93
|
+
"framework_gaps": [
|
|
94
|
+
"ALL-AI-PIPELINE-INTEGRITY",
|
|
95
|
+
"ALL-PROMPT-INJECTION-ACCESS-CONTROL",
|
|
96
|
+
"ISO-27001-2022-A.8.28",
|
|
97
|
+
"ISO-IEC-23894-2023-clause-7",
|
|
98
|
+
"NIST-800-53-AC-2",
|
|
99
|
+
"NIST-800-53-SI-3",
|
|
100
|
+
"OWASP-LLM-Top-10-2025-LLM01",
|
|
101
|
+
"OWASP-LLM-Top-10-2025-LLM02",
|
|
102
|
+
"SOC2-CC6-logical-access"
|
|
103
|
+
],
|
|
104
|
+
"rfc_refs": [],
|
|
105
|
+
"cwe_refs": [
|
|
106
|
+
"CWE-1039",
|
|
107
|
+
"CWE-1426",
|
|
108
|
+
"CWE-94"
|
|
109
|
+
],
|
|
110
|
+
"d3fend_refs": [
|
|
111
|
+
"D3-IOPR",
|
|
112
|
+
"D3-NTA"
|
|
113
|
+
],
|
|
114
|
+
"dlp_refs": []
|
|
115
|
+
},
|
|
116
|
+
{
|
|
117
|
+
"name": "ai-c2-detection",
|
|
118
|
+
"version": "1.0.0",
|
|
119
|
+
"triggers": [
|
|
120
|
+
"ai api abuse",
|
|
121
|
+
"ai c2",
|
|
122
|
+
"ai command and control",
|
|
123
|
+
"aml.t0096",
|
|
124
|
+
"covert channel ai",
|
|
125
|
+
"llm c2",
|
|
126
|
+
"promptflux",
|
|
127
|
+
"promptsteal",
|
|
128
|
+
"sesameop"
|
|
129
|
+
],
|
|
130
|
+
"data_deps": [
|
|
131
|
+
"atlas-ttps.json",
|
|
132
|
+
"cve-catalog.json",
|
|
133
|
+
"framework-control-gaps.json"
|
|
134
|
+
],
|
|
135
|
+
"atlas_refs": [
|
|
136
|
+
"AML.T0017",
|
|
137
|
+
"AML.T0096"
|
|
138
|
+
],
|
|
139
|
+
"attack_refs": [
|
|
140
|
+
"T1071",
|
|
141
|
+
"T1102",
|
|
142
|
+
"T1568"
|
|
143
|
+
],
|
|
144
|
+
"framework_gaps": [
|
|
145
|
+
"ISO-27001-2022-A.8.16",
|
|
146
|
+
"NIST-800-53-SC-7",
|
|
147
|
+
"NIST-800-53-SI-3",
|
|
148
|
+
"SOC2-CC7-anomaly-detection"
|
|
149
|
+
],
|
|
150
|
+
"rfc_refs": [
|
|
151
|
+
"RFC-8446",
|
|
152
|
+
"RFC-9000",
|
|
153
|
+
"RFC-9114",
|
|
154
|
+
"RFC-9180",
|
|
155
|
+
"RFC-9421",
|
|
156
|
+
"RFC-9458"
|
|
157
|
+
],
|
|
158
|
+
"cwe_refs": [],
|
|
159
|
+
"d3fend_refs": [
|
|
160
|
+
"D3-CA",
|
|
161
|
+
"D3-CSPP",
|
|
162
|
+
"D3-DA",
|
|
163
|
+
"D3-IOPR",
|
|
164
|
+
"D3-NI",
|
|
165
|
+
"D3-NTA",
|
|
166
|
+
"D3-NTPM"
|
|
167
|
+
],
|
|
168
|
+
"dlp_refs": []
|
|
169
|
+
},
|
|
170
|
+
{
|
|
171
|
+
"name": "ai-risk-management",
|
|
172
|
+
"version": "1.0.0",
|
|
173
|
+
"triggers": [
|
|
174
|
+
"ai governance",
|
|
175
|
+
"ai impact assessment",
|
|
176
|
+
"ai incident response",
|
|
177
|
+
"ai management system",
|
|
178
|
+
"ai red team program",
|
|
179
|
+
"ai risk management",
|
|
180
|
+
"ai vendor risk",
|
|
181
|
+
"aia",
|
|
182
|
+
"dpia ai",
|
|
183
|
+
"eu ai act high-risk",
|
|
184
|
+
"iso 23894",
|
|
185
|
+
"iso 42001",
|
|
186
|
+
"nist ai rmf"
|
|
187
|
+
],
|
|
188
|
+
"data_deps": [
|
|
189
|
+
"atlas-ttps.json",
|
|
190
|
+
"cwe-catalog.json",
|
|
191
|
+
"d3fend-catalog.json",
|
|
192
|
+
"framework-control-gaps.json",
|
|
193
|
+
"global-frameworks.json",
|
|
194
|
+
"zeroday-lessons.json"
|
|
195
|
+
],
|
|
196
|
+
"atlas_refs": [
|
|
197
|
+
"AML.T0017",
|
|
198
|
+
"AML.T0051",
|
|
199
|
+
"AML.T0096"
|
|
200
|
+
],
|
|
201
|
+
"attack_refs": [],
|
|
202
|
+
"framework_gaps": [
|
|
203
|
+
"ISO-IEC-23894-2023-clause-7",
|
|
204
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
205
|
+
"NIST-AI-RMF-MEASURE-2.5",
|
|
206
|
+
"OWASP-LLM-Top-10-2025-LLM01"
|
|
207
|
+
],
|
|
208
|
+
"rfc_refs": [],
|
|
209
|
+
"cwe_refs": [
|
|
210
|
+
"CWE-1039",
|
|
211
|
+
"CWE-1426"
|
|
212
|
+
],
|
|
213
|
+
"d3fend_refs": [],
|
|
214
|
+
"dlp_refs": []
|
|
215
|
+
},
|
|
216
|
+
{
|
|
217
|
+
"name": "api-security",
|
|
218
|
+
"version": "1.0.0",
|
|
219
|
+
"triggers": [
|
|
220
|
+
"ai api security",
|
|
221
|
+
"api gateway",
|
|
222
|
+
"api security",
|
|
223
|
+
"bfla",
|
|
224
|
+
"bola",
|
|
225
|
+
"graphql security",
|
|
226
|
+
"grpc security",
|
|
227
|
+
"mass assignment",
|
|
228
|
+
"mcp transport",
|
|
229
|
+
"openapi security",
|
|
230
|
+
"owasp api top 10",
|
|
231
|
+
"rate limiting",
|
|
232
|
+
"rest security",
|
|
233
|
+
"websocket security"
|
|
234
|
+
],
|
|
235
|
+
"data_deps": [
|
|
236
|
+
"atlas-ttps.json",
|
|
237
|
+
"cve-catalog.json",
|
|
238
|
+
"cwe-catalog.json",
|
|
239
|
+
"d3fend-catalog.json",
|
|
240
|
+
"framework-control-gaps.json",
|
|
241
|
+
"rfc-references.json"
|
|
242
|
+
],
|
|
243
|
+
"atlas_refs": [
|
|
244
|
+
"AML.T0017",
|
|
245
|
+
"AML.T0096"
|
|
246
|
+
],
|
|
247
|
+
"attack_refs": [
|
|
248
|
+
"T1078",
|
|
249
|
+
"T1190",
|
|
250
|
+
"T1567"
|
|
251
|
+
],
|
|
252
|
+
"framework_gaps": [
|
|
253
|
+
"ISO-27001-2022-A.8.28",
|
|
254
|
+
"NIST-800-218-SSDF",
|
|
255
|
+
"NIST-800-53-AC-2",
|
|
256
|
+
"OWASP-ASVS-v5.0-V14"
|
|
257
|
+
],
|
|
258
|
+
"rfc_refs": [
|
|
259
|
+
"RFC-6749",
|
|
260
|
+
"RFC-7519",
|
|
261
|
+
"RFC-8446",
|
|
262
|
+
"RFC-8725",
|
|
263
|
+
"RFC-9114",
|
|
264
|
+
"RFC-9421",
|
|
265
|
+
"RFC-9700"
|
|
266
|
+
],
|
|
267
|
+
"cwe_refs": [
|
|
268
|
+
"CWE-1188",
|
|
269
|
+
"CWE-200",
|
|
270
|
+
"CWE-22",
|
|
271
|
+
"CWE-287",
|
|
272
|
+
"CWE-352",
|
|
273
|
+
"CWE-77",
|
|
274
|
+
"CWE-862",
|
|
275
|
+
"CWE-863",
|
|
276
|
+
"CWE-918"
|
|
277
|
+
],
|
|
278
|
+
"d3fend_refs": [],
|
|
279
|
+
"dlp_refs": []
|
|
280
|
+
},
|
|
281
|
+
{
|
|
282
|
+
"name": "attack-surface-pentest",
|
|
283
|
+
"version": "1.0.0",
|
|
284
|
+
"triggers": [
|
|
285
|
+
"adversary emulation",
|
|
286
|
+
"asm",
|
|
287
|
+
"asset inventory",
|
|
288
|
+
"attack surface",
|
|
289
|
+
"external footprint",
|
|
290
|
+
"pen test",
|
|
291
|
+
"penetration testing",
|
|
292
|
+
"red team",
|
|
293
|
+
"threat-led testing",
|
|
294
|
+
"tiber-eu",
|
|
295
|
+
"tlpt"
|
|
296
|
+
],
|
|
297
|
+
"data_deps": [
|
|
298
|
+
"atlas-ttps.json",
|
|
299
|
+
"cve-catalog.json",
|
|
300
|
+
"cwe-catalog.json",
|
|
301
|
+
"d3fend-catalog.json",
|
|
302
|
+
"framework-control-gaps.json"
|
|
303
|
+
],
|
|
304
|
+
"atlas_refs": [
|
|
305
|
+
"AML.T0010",
|
|
306
|
+
"AML.T0043",
|
|
307
|
+
"AML.T0051"
|
|
308
|
+
],
|
|
309
|
+
"attack_refs": [
|
|
310
|
+
"T1059",
|
|
311
|
+
"T1078",
|
|
312
|
+
"T1133",
|
|
313
|
+
"T1190"
|
|
314
|
+
],
|
|
315
|
+
"framework_gaps": [
|
|
316
|
+
"NIS2-Art21-patch-management",
|
|
317
|
+
"NIST-800-115",
|
|
318
|
+
"OWASP-Pen-Testing-Guide-v5",
|
|
319
|
+
"PTES-Pre-engagement"
|
|
320
|
+
],
|
|
321
|
+
"rfc_refs": [],
|
|
322
|
+
"cwe_refs": [
|
|
323
|
+
"CWE-1395",
|
|
324
|
+
"CWE-22",
|
|
325
|
+
"CWE-269",
|
|
326
|
+
"CWE-352",
|
|
327
|
+
"CWE-434",
|
|
328
|
+
"CWE-732",
|
|
329
|
+
"CWE-78",
|
|
330
|
+
"CWE-787",
|
|
331
|
+
"CWE-79",
|
|
332
|
+
"CWE-89",
|
|
333
|
+
"CWE-918"
|
|
334
|
+
],
|
|
335
|
+
"d3fend_refs": [
|
|
336
|
+
"D3-CSPP",
|
|
337
|
+
"D3-EAL",
|
|
338
|
+
"D3-NTA"
|
|
339
|
+
],
|
|
340
|
+
"dlp_refs": []
|
|
341
|
+
},
|
|
342
|
+
{
|
|
343
|
+
"name": "cloud-security",
|
|
344
|
+
"version": "1.0.0",
|
|
345
|
+
"triggers": [
|
|
346
|
+
"aws security",
|
|
347
|
+
"azure security",
|
|
348
|
+
"cloud iam",
|
|
349
|
+
"cloud runtime",
|
|
350
|
+
"cloud security",
|
|
351
|
+
"cnapp",
|
|
352
|
+
"csa ccm",
|
|
353
|
+
"cspm",
|
|
354
|
+
"cwpp",
|
|
355
|
+
"falco",
|
|
356
|
+
"gcp security",
|
|
357
|
+
"irsa",
|
|
358
|
+
"multi cloud",
|
|
359
|
+
"shared responsibility",
|
|
360
|
+
"workload identity"
|
|
361
|
+
],
|
|
362
|
+
"data_deps": [
|
|
363
|
+
"atlas-ttps.json",
|
|
364
|
+
"cve-catalog.json",
|
|
365
|
+
"cwe-catalog.json",
|
|
366
|
+
"d3fend-catalog.json",
|
|
367
|
+
"framework-control-gaps.json",
|
|
368
|
+
"rfc-references.json"
|
|
369
|
+
],
|
|
370
|
+
"atlas_refs": [
|
|
371
|
+
"AML.T0010",
|
|
372
|
+
"AML.T0017"
|
|
373
|
+
],
|
|
374
|
+
"attack_refs": [
|
|
375
|
+
"T1078",
|
|
376
|
+
"T1190",
|
|
377
|
+
"T1530",
|
|
378
|
+
"T1552"
|
|
379
|
+
],
|
|
380
|
+
"framework_gaps": [
|
|
381
|
+
"FedRAMP-Rev5-Moderate",
|
|
382
|
+
"ISO-27001-2022-A.8.30",
|
|
383
|
+
"NIST-800-53-CM-7",
|
|
384
|
+
"SOC2-CC9-vendor-management"
|
|
385
|
+
],
|
|
386
|
+
"rfc_refs": [
|
|
387
|
+
"RFC-7519",
|
|
388
|
+
"RFC-8446",
|
|
389
|
+
"RFC-8725",
|
|
390
|
+
"RFC-9180"
|
|
391
|
+
],
|
|
392
|
+
"cwe_refs": [
|
|
393
|
+
"CWE-1188",
|
|
394
|
+
"CWE-200",
|
|
395
|
+
"CWE-287",
|
|
396
|
+
"CWE-732",
|
|
397
|
+
"CWE-798",
|
|
398
|
+
"CWE-862"
|
|
399
|
+
],
|
|
400
|
+
"d3fend_refs": [],
|
|
401
|
+
"dlp_refs": []
|
|
402
|
+
},
|
|
403
|
+
{
|
|
404
|
+
"name": "compliance-theater",
|
|
405
|
+
"version": "1.0.0",
|
|
406
|
+
"triggers": [
|
|
407
|
+
"audit but exposed",
|
|
408
|
+
"audit theater",
|
|
409
|
+
"checkbox security",
|
|
410
|
+
"compliance gap",
|
|
411
|
+
"compliance theater",
|
|
412
|
+
"compliant but vulnerable",
|
|
413
|
+
"paper compliance"
|
|
414
|
+
],
|
|
415
|
+
"data_deps": [
|
|
416
|
+
"cve-catalog.json",
|
|
417
|
+
"exploit-availability.json",
|
|
418
|
+
"framework-control-gaps.json"
|
|
419
|
+
],
|
|
420
|
+
"atlas_refs": [],
|
|
421
|
+
"attack_refs": [],
|
|
422
|
+
"framework_gaps": [
|
|
423
|
+
"ALL-AI-PIPELINE-INTEGRITY",
|
|
424
|
+
"ALL-PROMPT-INJECTION-ACCESS-CONTROL",
|
|
425
|
+
"CMMC-2.0-Level-2",
|
|
426
|
+
"FedRAMP-Rev5-Moderate"
|
|
427
|
+
],
|
|
428
|
+
"rfc_refs": [],
|
|
429
|
+
"cwe_refs": [],
|
|
430
|
+
"d3fend_refs": [],
|
|
431
|
+
"dlp_refs": []
|
|
432
|
+
},
|
|
433
|
+
{
|
|
434
|
+
"name": "container-runtime-security",
|
|
435
|
+
"version": "1.0.0",
|
|
436
|
+
"triggers": [
|
|
437
|
+
"admission controller",
|
|
438
|
+
"cilium",
|
|
439
|
+
"cis kubernetes",
|
|
440
|
+
"container security",
|
|
441
|
+
"falco",
|
|
442
|
+
"gatekeeper",
|
|
443
|
+
"k8s security",
|
|
444
|
+
"kserve",
|
|
445
|
+
"kubernetes security",
|
|
446
|
+
"kyverno",
|
|
447
|
+
"networkpolicy",
|
|
448
|
+
"nsa hardening",
|
|
449
|
+
"opa",
|
|
450
|
+
"pod security standards",
|
|
451
|
+
"sigstore policy",
|
|
452
|
+
"tetragon",
|
|
453
|
+
"vllm"
|
|
454
|
+
],
|
|
455
|
+
"data_deps": [
|
|
456
|
+
"atlas-ttps.json",
|
|
457
|
+
"cve-catalog.json",
|
|
458
|
+
"cwe-catalog.json",
|
|
459
|
+
"d3fend-catalog.json",
|
|
460
|
+
"framework-control-gaps.json",
|
|
461
|
+
"rfc-references.json"
|
|
462
|
+
],
|
|
463
|
+
"atlas_refs": [
|
|
464
|
+
"AML.T0010"
|
|
465
|
+
],
|
|
466
|
+
"attack_refs": [
|
|
467
|
+
"T1068",
|
|
468
|
+
"T1190",
|
|
469
|
+
"T1610",
|
|
470
|
+
"T1611"
|
|
471
|
+
],
|
|
472
|
+
"framework_gaps": [
|
|
473
|
+
"ISO-27001-2022-A.8.28",
|
|
474
|
+
"NIST-800-53-CM-7",
|
|
475
|
+
"SLSA-v1.0-Build-L3"
|
|
476
|
+
],
|
|
477
|
+
"rfc_refs": [
|
|
478
|
+
"RFC-8032",
|
|
479
|
+
"RFC-8446"
|
|
480
|
+
],
|
|
481
|
+
"cwe_refs": [
|
|
482
|
+
"CWE-1188",
|
|
483
|
+
"CWE-1395",
|
|
484
|
+
"CWE-269",
|
|
485
|
+
"CWE-732",
|
|
486
|
+
"CWE-787"
|
|
487
|
+
],
|
|
488
|
+
"d3fend_refs": [],
|
|
489
|
+
"dlp_refs": []
|
|
490
|
+
},
|
|
491
|
+
{
|
|
492
|
+
"name": "coordinated-vuln-disclosure",
|
|
493
|
+
"version": "1.0.0",
|
|
494
|
+
"triggers": [
|
|
495
|
+
"90-day disclosure",
|
|
496
|
+
"bug bounty",
|
|
497
|
+
"coordinated vulnerability disclosure",
|
|
498
|
+
"csaf",
|
|
499
|
+
"cvd",
|
|
500
|
+
"iso 29147",
|
|
501
|
+
"iso 30111",
|
|
502
|
+
"project zero",
|
|
503
|
+
"responsible disclosure",
|
|
504
|
+
"security.txt",
|
|
505
|
+
"vdp",
|
|
506
|
+
"vulnerability disclosure program"
|
|
507
|
+
],
|
|
508
|
+
"data_deps": [
|
|
509
|
+
"atlas-ttps.json",
|
|
510
|
+
"cve-catalog.json",
|
|
511
|
+
"cwe-catalog.json",
|
|
512
|
+
"d3fend-catalog.json",
|
|
513
|
+
"framework-control-gaps.json",
|
|
514
|
+
"rfc-references.json",
|
|
515
|
+
"zeroday-lessons.json"
|
|
516
|
+
],
|
|
517
|
+
"atlas_refs": [],
|
|
518
|
+
"attack_refs": [],
|
|
519
|
+
"framework_gaps": [
|
|
520
|
+
"ISO-27001-2022-A.8.8",
|
|
521
|
+
"NIST-800-218-SSDF",
|
|
522
|
+
"SOC2-CC9-vendor-management"
|
|
523
|
+
],
|
|
524
|
+
"rfc_refs": [],
|
|
525
|
+
"cwe_refs": [
|
|
526
|
+
"CWE-1357"
|
|
527
|
+
],
|
|
528
|
+
"d3fend_refs": [],
|
|
529
|
+
"dlp_refs": []
|
|
530
|
+
},
|
|
531
|
+
{
|
|
532
|
+
"name": "defensive-countermeasure-mapping",
|
|
533
|
+
"version": "1.0.0",
|
|
534
|
+
"triggers": [
|
|
535
|
+
"blue team",
|
|
536
|
+
"blue team map",
|
|
537
|
+
"control mapping",
|
|
538
|
+
"countermeasure",
|
|
539
|
+
"d3fend",
|
|
540
|
+
"defense in depth",
|
|
541
|
+
"defensive coverage",
|
|
542
|
+
"defensive mapping",
|
|
543
|
+
"least privilege",
|
|
544
|
+
"mitigation",
|
|
545
|
+
"zero trust"
|
|
546
|
+
],
|
|
547
|
+
"data_deps": [
|
|
548
|
+
"atlas-ttps.json",
|
|
549
|
+
"cve-catalog.json",
|
|
550
|
+
"cwe-catalog.json",
|
|
551
|
+
"d3fend-catalog.json",
|
|
552
|
+
"dlp-controls.json",
|
|
553
|
+
"framework-control-gaps.json"
|
|
554
|
+
],
|
|
555
|
+
"atlas_refs": [],
|
|
556
|
+
"attack_refs": [],
|
|
557
|
+
"framework_gaps": [],
|
|
558
|
+
"rfc_refs": [],
|
|
559
|
+
"cwe_refs": [],
|
|
560
|
+
"d3fend_refs": [
|
|
561
|
+
"D3-ASLR",
|
|
562
|
+
"D3-CA",
|
|
563
|
+
"D3-CBAN",
|
|
564
|
+
"D3-CSPP",
|
|
565
|
+
"D3-DA",
|
|
566
|
+
"D3-EAL",
|
|
567
|
+
"D3-EHB",
|
|
568
|
+
"D3-FAPA",
|
|
569
|
+
"D3-FE",
|
|
570
|
+
"D3-IOPR",
|
|
571
|
+
"D3-MENCR",
|
|
572
|
+
"D3-MFA",
|
|
573
|
+
"D3-NI",
|
|
574
|
+
"D3-NTA",
|
|
575
|
+
"D3-NTPM",
|
|
576
|
+
"D3-PA",
|
|
577
|
+
"D3-PHRA",
|
|
578
|
+
"D3-PSEP",
|
|
579
|
+
"D3-RPA",
|
|
580
|
+
"D3-SCP"
|
|
581
|
+
],
|
|
582
|
+
"dlp_refs": []
|
|
583
|
+
},
|
|
584
|
+
{
|
|
585
|
+
"name": "dlp-gap-analysis",
|
|
586
|
+
"version": "1.0.0",
|
|
587
|
+
"triggers": [
|
|
588
|
+
"clipboard ai paste",
|
|
589
|
+
"copilot data leak",
|
|
590
|
+
"data classification",
|
|
591
|
+
"data exfiltration",
|
|
592
|
+
"data leak",
|
|
593
|
+
"data loss prevention",
|
|
594
|
+
"dlp",
|
|
595
|
+
"egress",
|
|
596
|
+
"embedding store exfil",
|
|
597
|
+
"exfiltration",
|
|
598
|
+
"llm dlp",
|
|
599
|
+
"mcp tool arg dlp",
|
|
600
|
+
"prompt dlp",
|
|
601
|
+
"rag exfil"
|
|
602
|
+
],
|
|
603
|
+
"data_deps": [
|
|
604
|
+
"atlas-ttps.json",
|
|
605
|
+
"cve-catalog.json",
|
|
606
|
+
"cwe-catalog.json",
|
|
607
|
+
"d3fend-catalog.json",
|
|
608
|
+
"dlp-controls.json",
|
|
609
|
+
"framework-control-gaps.json",
|
|
610
|
+
"global-frameworks.json"
|
|
611
|
+
],
|
|
612
|
+
"atlas_refs": [
|
|
613
|
+
"AML.T0017",
|
|
614
|
+
"AML.T0051",
|
|
615
|
+
"AML.T0096"
|
|
616
|
+
],
|
|
617
|
+
"attack_refs": [
|
|
618
|
+
"T1041",
|
|
619
|
+
"T1213",
|
|
620
|
+
"T1530",
|
|
621
|
+
"T1567"
|
|
622
|
+
],
|
|
623
|
+
"framework_gaps": [
|
|
624
|
+
"HIPAA-Security-Rule-164.312(a)(1)",
|
|
625
|
+
"ISO-27001-2022-A.8.16",
|
|
626
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
627
|
+
"NIST-800-53-SC-28",
|
|
628
|
+
"NIST-800-53-SC-7",
|
|
629
|
+
"SOC2-CC7-anomaly-detection"
|
|
630
|
+
],
|
|
631
|
+
"rfc_refs": [
|
|
632
|
+
"RFC-8446",
|
|
633
|
+
"RFC-9458"
|
|
634
|
+
],
|
|
635
|
+
"cwe_refs": [
|
|
636
|
+
"CWE-1426",
|
|
637
|
+
"CWE-200"
|
|
638
|
+
],
|
|
639
|
+
"d3fend_refs": [
|
|
640
|
+
"D3-CSPP",
|
|
641
|
+
"D3-EAL",
|
|
642
|
+
"D3-IOPR",
|
|
643
|
+
"D3-NTA",
|
|
644
|
+
"D3-NTPM"
|
|
645
|
+
],
|
|
646
|
+
"dlp_refs": []
|
|
647
|
+
},
|
|
648
|
+
{
|
|
649
|
+
"name": "email-security-anti-phishing",
|
|
650
|
+
"version": "1.0.0",
|
|
651
|
+
"triggers": [
|
|
652
|
+
"ai phishing",
|
|
653
|
+
"anti-phishing",
|
|
654
|
+
"arc",
|
|
655
|
+
"bec",
|
|
656
|
+
"bimi",
|
|
657
|
+
"business email compromise",
|
|
658
|
+
"deepfake phishing",
|
|
659
|
+
"dkim",
|
|
660
|
+
"dmarc",
|
|
661
|
+
"email security",
|
|
662
|
+
"mta-sts",
|
|
663
|
+
"phishing",
|
|
664
|
+
"secure email gateway",
|
|
665
|
+
"spear phishing",
|
|
666
|
+
"spf",
|
|
667
|
+
"tlsrpt",
|
|
668
|
+
"vishing"
|
|
669
|
+
],
|
|
670
|
+
"data_deps": [
|
|
671
|
+
"atlas-ttps.json",
|
|
672
|
+
"cve-catalog.json",
|
|
673
|
+
"cwe-catalog.json",
|
|
674
|
+
"d3fend-catalog.json",
|
|
675
|
+
"dlp-controls.json",
|
|
676
|
+
"framework-control-gaps.json",
|
|
677
|
+
"rfc-references.json"
|
|
678
|
+
],
|
|
679
|
+
"atlas_refs": [],
|
|
680
|
+
"attack_refs": [
|
|
681
|
+
"T1078",
|
|
682
|
+
"T1566",
|
|
683
|
+
"T1566.001",
|
|
684
|
+
"T1566.002",
|
|
685
|
+
"T1566.003"
|
|
686
|
+
],
|
|
687
|
+
"framework_gaps": [
|
|
688
|
+
"ISO-27001-2022-A.8.16",
|
|
689
|
+
"NIST-800-53-SI-3",
|
|
690
|
+
"SOC2-CC7-anomaly-detection"
|
|
691
|
+
],
|
|
692
|
+
"rfc_refs": [],
|
|
693
|
+
"cwe_refs": [],
|
|
694
|
+
"d3fend_refs": [],
|
|
695
|
+
"dlp_refs": []
|
|
696
|
+
},
|
|
697
|
+
{
|
|
698
|
+
"name": "exploit-scoring",
|
|
699
|
+
"version": "1.0.0",
|
|
700
|
+
"triggers": [
|
|
701
|
+
"beyond cvss",
|
|
702
|
+
"cve priority",
|
|
703
|
+
"exploit scoring",
|
|
704
|
+
"how bad is this cve",
|
|
705
|
+
"patch priority",
|
|
706
|
+
"prioritize cve",
|
|
707
|
+
"real world priority",
|
|
708
|
+
"rwep"
|
|
709
|
+
],
|
|
710
|
+
"data_deps": [
|
|
711
|
+
"cve-catalog.json",
|
|
712
|
+
"exploit-availability.json"
|
|
713
|
+
],
|
|
714
|
+
"atlas_refs": [],
|
|
715
|
+
"attack_refs": [],
|
|
716
|
+
"framework_gaps": [
|
|
717
|
+
"CIS-Controls-v8-Control7",
|
|
718
|
+
"CWE-Top-25-2024-meta"
|
|
719
|
+
],
|
|
720
|
+
"rfc_refs": [],
|
|
721
|
+
"cwe_refs": [],
|
|
722
|
+
"d3fend_refs": [],
|
|
723
|
+
"dlp_refs": []
|
|
724
|
+
},
|
|
725
|
+
{
|
|
726
|
+
"name": "framework-gap-analysis",
|
|
727
|
+
"version": "1.0.0",
|
|
728
|
+
"triggers": [
|
|
729
|
+
"compliance gap",
|
|
730
|
+
"control gap",
|
|
731
|
+
"framework gap",
|
|
732
|
+
"iso 27001 gap",
|
|
733
|
+
"nis2 gap",
|
|
734
|
+
"nist gap",
|
|
735
|
+
"pci gap",
|
|
736
|
+
"soc 2 gap",
|
|
737
|
+
"why doesn't this control cover"
|
|
738
|
+
],
|
|
739
|
+
"data_deps": [
|
|
740
|
+
"atlas-ttps.json",
|
|
741
|
+
"cve-catalog.json",
|
|
742
|
+
"framework-control-gaps.json",
|
|
743
|
+
"global-frameworks.json"
|
|
744
|
+
],
|
|
745
|
+
"atlas_refs": [],
|
|
746
|
+
"attack_refs": [],
|
|
747
|
+
"framework_gaps": [],
|
|
748
|
+
"rfc_refs": [],
|
|
749
|
+
"cwe_refs": [],
|
|
750
|
+
"d3fend_refs": [],
|
|
751
|
+
"dlp_refs": []
|
|
752
|
+
},
|
|
753
|
+
{
|
|
754
|
+
"name": "fuzz-testing-strategy",
|
|
755
|
+
"version": "1.0.0",
|
|
756
|
+
"triggers": [
|
|
757
|
+
"afl",
|
|
758
|
+
"ai-assisted fuzz",
|
|
759
|
+
"api fuzz",
|
|
760
|
+
"continuous fuzz",
|
|
761
|
+
"coverage-guided fuzz",
|
|
762
|
+
"fuzz testing",
|
|
763
|
+
"fuzzing",
|
|
764
|
+
"libfuzzer",
|
|
765
|
+
"oss-fuzz",
|
|
766
|
+
"prompt fuzz",
|
|
767
|
+
"syzkaller"
|
|
768
|
+
],
|
|
769
|
+
"data_deps": [
|
|
770
|
+
"atlas-ttps.json",
|
|
771
|
+
"cve-catalog.json",
|
|
772
|
+
"cwe-catalog.json",
|
|
773
|
+
"d3fend-catalog.json",
|
|
774
|
+
"framework-control-gaps.json"
|
|
775
|
+
],
|
|
776
|
+
"atlas_refs": [
|
|
777
|
+
"AML.T0043"
|
|
778
|
+
],
|
|
779
|
+
"attack_refs": [
|
|
780
|
+
"T1190"
|
|
781
|
+
],
|
|
782
|
+
"framework_gaps": [
|
|
783
|
+
"NIST-800-115",
|
|
784
|
+
"NIST-800-218-SSDF",
|
|
785
|
+
"OWASP-ASVS-v5.0-V14"
|
|
786
|
+
],
|
|
787
|
+
"rfc_refs": [],
|
|
788
|
+
"cwe_refs": [
|
|
789
|
+
"CWE-125",
|
|
790
|
+
"CWE-20",
|
|
791
|
+
"CWE-362",
|
|
792
|
+
"CWE-416",
|
|
793
|
+
"CWE-78",
|
|
794
|
+
"CWE-787"
|
|
795
|
+
],
|
|
796
|
+
"d3fend_refs": [
|
|
797
|
+
"D3-EAL",
|
|
798
|
+
"D3-IOPR",
|
|
799
|
+
"D3-PSEP"
|
|
800
|
+
],
|
|
801
|
+
"dlp_refs": []
|
|
802
|
+
},
|
|
803
|
+
{
|
|
804
|
+
"name": "global-grc",
|
|
805
|
+
"version": "1.0.0",
|
|
806
|
+
"triggers": [
|
|
807
|
+
"apra cps 234",
|
|
808
|
+
"cert-in",
|
|
809
|
+
"cyber resilience act",
|
|
810
|
+
"dora compliance",
|
|
811
|
+
"essential 8",
|
|
812
|
+
"eu ai act",
|
|
813
|
+
"gdpr security",
|
|
814
|
+
"global compliance",
|
|
815
|
+
"global grc",
|
|
816
|
+
"international compliance",
|
|
817
|
+
"mas trm",
|
|
818
|
+
"multi-jurisdiction",
|
|
819
|
+
"nis2"
|
|
820
|
+
],
|
|
821
|
+
"data_deps": [
|
|
822
|
+
"atlas-ttps.json",
|
|
823
|
+
"framework-control-gaps.json",
|
|
824
|
+
"global-frameworks.json"
|
|
825
|
+
],
|
|
826
|
+
"atlas_refs": [],
|
|
827
|
+
"attack_refs": [],
|
|
828
|
+
"framework_gaps": [],
|
|
829
|
+
"rfc_refs": [],
|
|
830
|
+
"cwe_refs": [],
|
|
831
|
+
"d3fend_refs": [],
|
|
832
|
+
"dlp_refs": []
|
|
833
|
+
},
|
|
834
|
+
{
|
|
835
|
+
"name": "identity-assurance",
|
|
836
|
+
"version": "1.0.0",
|
|
837
|
+
"triggers": [
|
|
838
|
+
"aal",
|
|
839
|
+
"agent identity",
|
|
840
|
+
"fal",
|
|
841
|
+
"federation",
|
|
842
|
+
"fido2",
|
|
843
|
+
"ial",
|
|
844
|
+
"identity assurance",
|
|
845
|
+
"nist 800-63",
|
|
846
|
+
"oidc",
|
|
847
|
+
"passkey",
|
|
848
|
+
"phishing-resistant",
|
|
849
|
+
"saml",
|
|
850
|
+
"scim",
|
|
851
|
+
"service account",
|
|
852
|
+
"webauthn",
|
|
853
|
+
"workload identity"
|
|
854
|
+
],
|
|
855
|
+
"data_deps": [
|
|
856
|
+
"atlas-ttps.json",
|
|
857
|
+
"cve-catalog.json",
|
|
858
|
+
"cwe-catalog.json",
|
|
859
|
+
"d3fend-catalog.json",
|
|
860
|
+
"framework-control-gaps.json",
|
|
861
|
+
"rfc-references.json"
|
|
862
|
+
],
|
|
863
|
+
"atlas_refs": [
|
|
864
|
+
"AML.T0051"
|
|
865
|
+
],
|
|
866
|
+
"attack_refs": [
|
|
867
|
+
"T1078",
|
|
868
|
+
"T1110",
|
|
869
|
+
"T1556"
|
|
870
|
+
],
|
|
871
|
+
"framework_gaps": [
|
|
872
|
+
"ISO-27001-2022-A.8.30",
|
|
873
|
+
"NIST-800-53-AC-2",
|
|
874
|
+
"NIST-800-63B-rev4",
|
|
875
|
+
"PSD2-RTS-SCA",
|
|
876
|
+
"SOC2-CC6-logical-access"
|
|
877
|
+
],
|
|
878
|
+
"rfc_refs": [
|
|
879
|
+
"RFC-6749",
|
|
880
|
+
"RFC-7519",
|
|
881
|
+
"RFC-8032",
|
|
882
|
+
"RFC-8725",
|
|
883
|
+
"RFC-9700"
|
|
884
|
+
],
|
|
885
|
+
"cwe_refs": [
|
|
886
|
+
"CWE-269",
|
|
887
|
+
"CWE-287",
|
|
888
|
+
"CWE-306",
|
|
889
|
+
"CWE-732",
|
|
890
|
+
"CWE-798",
|
|
891
|
+
"CWE-862",
|
|
892
|
+
"CWE-863"
|
|
893
|
+
],
|
|
894
|
+
"d3fend_refs": [],
|
|
895
|
+
"dlp_refs": []
|
|
896
|
+
},
|
|
897
|
+
{
|
|
898
|
+
"name": "incident-response-playbook",
|
|
899
|
+
"version": "1.0.0",
|
|
900
|
+
"triggers": [
|
|
901
|
+
"ai incident",
|
|
902
|
+
"blue team",
|
|
903
|
+
"breach notification",
|
|
904
|
+
"csirt",
|
|
905
|
+
"incident handler",
|
|
906
|
+
"incident response",
|
|
907
|
+
"ir playbook",
|
|
908
|
+
"iso 27035",
|
|
909
|
+
"model exfiltration incident",
|
|
910
|
+
"nist 800-61",
|
|
911
|
+
"picerl",
|
|
912
|
+
"prompt injection incident",
|
|
913
|
+
"soc playbook"
|
|
914
|
+
],
|
|
915
|
+
"data_deps": [
|
|
916
|
+
"atlas-ttps.json",
|
|
917
|
+
"cve-catalog.json",
|
|
918
|
+
"cwe-catalog.json",
|
|
919
|
+
"d3fend-catalog.json",
|
|
920
|
+
"framework-control-gaps.json",
|
|
921
|
+
"global-frameworks.json",
|
|
922
|
+
"zeroday-lessons.json"
|
|
923
|
+
],
|
|
924
|
+
"atlas_refs": [
|
|
925
|
+
"AML.T0017",
|
|
926
|
+
"AML.T0051",
|
|
927
|
+
"AML.T0096"
|
|
928
|
+
],
|
|
929
|
+
"attack_refs": [
|
|
930
|
+
"T1041",
|
|
931
|
+
"T1078",
|
|
932
|
+
"T1486",
|
|
933
|
+
"T1567"
|
|
934
|
+
],
|
|
935
|
+
"framework_gaps": [
|
|
936
|
+
"ISO-27001-2022-A.8.16",
|
|
937
|
+
"NIST-800-53-AC-2",
|
|
938
|
+
"SOC2-CC7-anomaly-detection"
|
|
939
|
+
],
|
|
940
|
+
"rfc_refs": [],
|
|
941
|
+
"cwe_refs": [],
|
|
942
|
+
"d3fend_refs": [],
|
|
943
|
+
"dlp_refs": []
|
|
944
|
+
},
|
|
945
|
+
{
|
|
946
|
+
"name": "kernel-lpe-triage",
|
|
947
|
+
"version": "1.0.0",
|
|
948
|
+
"triggers": [
|
|
949
|
+
"copy fail",
|
|
950
|
+
"cve-2026-31431",
|
|
951
|
+
"cve-2026-43284",
|
|
952
|
+
"dirty frag",
|
|
953
|
+
"kernel lpe",
|
|
954
|
+
"kernel patch",
|
|
955
|
+
"linux root",
|
|
956
|
+
"live kernel patch",
|
|
957
|
+
"privilege escalation"
|
|
958
|
+
],
|
|
959
|
+
"data_deps": [
|
|
960
|
+
"cve-catalog.json",
|
|
961
|
+
"exploit-availability.json"
|
|
962
|
+
],
|
|
963
|
+
"atlas_refs": [],
|
|
964
|
+
"attack_refs": [
|
|
965
|
+
"T1068",
|
|
966
|
+
"T1548.001"
|
|
967
|
+
],
|
|
968
|
+
"framework_gaps": [
|
|
969
|
+
"CIS-Controls-v8-Control7",
|
|
970
|
+
"ISO-27001-2022-A.8.8",
|
|
971
|
+
"NIS2-Art21-patch-management",
|
|
972
|
+
"NIST-800-53-SC-8",
|
|
973
|
+
"NIST-800-53-SI-2",
|
|
974
|
+
"PCI-DSS-4.0-6.3.3"
|
|
975
|
+
],
|
|
976
|
+
"rfc_refs": [
|
|
977
|
+
"RFC-4301",
|
|
978
|
+
"RFC-4303",
|
|
979
|
+
"RFC-7296"
|
|
980
|
+
],
|
|
981
|
+
"cwe_refs": [
|
|
982
|
+
"CWE-125",
|
|
983
|
+
"CWE-362",
|
|
984
|
+
"CWE-416",
|
|
985
|
+
"CWE-672",
|
|
986
|
+
"CWE-787"
|
|
987
|
+
],
|
|
988
|
+
"d3fend_refs": [
|
|
989
|
+
"D3-ASLR",
|
|
990
|
+
"D3-EAL",
|
|
991
|
+
"D3-PHRA",
|
|
992
|
+
"D3-PSEP"
|
|
993
|
+
],
|
|
994
|
+
"dlp_refs": []
|
|
995
|
+
},
|
|
996
|
+
{
|
|
997
|
+
"name": "mcp-agent-trust",
|
|
998
|
+
"version": "1.0.0",
|
|
999
|
+
"triggers": [
|
|
1000
|
+
"agent trust",
|
|
1001
|
+
"ai agent security",
|
|
1002
|
+
"claude code security",
|
|
1003
|
+
"cursor security",
|
|
1004
|
+
"cve-2026-30615",
|
|
1005
|
+
"mcp rce",
|
|
1006
|
+
"mcp security",
|
|
1007
|
+
"model context protocol",
|
|
1008
|
+
"tool trust",
|
|
1009
|
+
"windsurf security"
|
|
1010
|
+
],
|
|
1011
|
+
"data_deps": [
|
|
1012
|
+
"atlas-ttps.json",
|
|
1013
|
+
"cve-catalog.json",
|
|
1014
|
+
"framework-control-gaps.json"
|
|
1015
|
+
],
|
|
1016
|
+
"atlas_refs": [
|
|
1017
|
+
"AML.T0010",
|
|
1018
|
+
"AML.T0016",
|
|
1019
|
+
"AML.T0096"
|
|
1020
|
+
],
|
|
1021
|
+
"attack_refs": [
|
|
1022
|
+
"T1059",
|
|
1023
|
+
"T1190",
|
|
1024
|
+
"T1195.001"
|
|
1025
|
+
],
|
|
1026
|
+
"framework_gaps": [
|
|
1027
|
+
"ALL-MCP-TOOL-TRUST",
|
|
1028
|
+
"ISO-27001-2022-A.8.30",
|
|
1029
|
+
"NIST-800-53-CM-7",
|
|
1030
|
+
"NIST-800-53-SA-12",
|
|
1031
|
+
"OWASP-LLM-Top-10-2025-LLM06",
|
|
1032
|
+
"SOC2-CC9-vendor-management",
|
|
1033
|
+
"SWIFT-CSCF-v2026-1.1"
|
|
1034
|
+
],
|
|
1035
|
+
"rfc_refs": [
|
|
1036
|
+
"RFC-6749",
|
|
1037
|
+
"RFC-7519",
|
|
1038
|
+
"RFC-8446",
|
|
1039
|
+
"RFC-8725",
|
|
1040
|
+
"RFC-9114",
|
|
1041
|
+
"RFC-9421",
|
|
1042
|
+
"RFC-9700"
|
|
1043
|
+
],
|
|
1044
|
+
"cwe_refs": [
|
|
1045
|
+
"CWE-22",
|
|
1046
|
+
"CWE-345",
|
|
1047
|
+
"CWE-352",
|
|
1048
|
+
"CWE-434",
|
|
1049
|
+
"CWE-494",
|
|
1050
|
+
"CWE-77",
|
|
1051
|
+
"CWE-918",
|
|
1052
|
+
"CWE-94"
|
|
1053
|
+
],
|
|
1054
|
+
"d3fend_refs": [
|
|
1055
|
+
"D3-CBAN",
|
|
1056
|
+
"D3-CSPP",
|
|
1057
|
+
"D3-EAL",
|
|
1058
|
+
"D3-EHB",
|
|
1059
|
+
"D3-MFA"
|
|
1060
|
+
],
|
|
1061
|
+
"dlp_refs": []
|
|
1062
|
+
},
|
|
1063
|
+
{
|
|
1064
|
+
"name": "mlops-security",
|
|
1065
|
+
"version": "1.0.0",
|
|
1066
|
+
"triggers": [
|
|
1067
|
+
"azure ml",
|
|
1068
|
+
"data card",
|
|
1069
|
+
"drift detection",
|
|
1070
|
+
"feature store",
|
|
1071
|
+
"hugging face",
|
|
1072
|
+
"kubeflow",
|
|
1073
|
+
"ml pipeline security",
|
|
1074
|
+
"mlflow",
|
|
1075
|
+
"mlops security",
|
|
1076
|
+
"model card",
|
|
1077
|
+
"model monitoring",
|
|
1078
|
+
"model registry security",
|
|
1079
|
+
"model signing",
|
|
1080
|
+
"sagemaker",
|
|
1081
|
+
"training data integrity",
|
|
1082
|
+
"vertex ai"
|
|
1083
|
+
],
|
|
1084
|
+
"data_deps": [
|
|
1085
|
+
"atlas-ttps.json",
|
|
1086
|
+
"cve-catalog.json",
|
|
1087
|
+
"cwe-catalog.json",
|
|
1088
|
+
"d3fend-catalog.json",
|
|
1089
|
+
"framework-control-gaps.json",
|
|
1090
|
+
"rfc-references.json"
|
|
1091
|
+
],
|
|
1092
|
+
"atlas_refs": [
|
|
1093
|
+
"AML.T0010",
|
|
1094
|
+
"AML.T0017",
|
|
1095
|
+
"AML.T0018",
|
|
1096
|
+
"AML.T0020",
|
|
1097
|
+
"AML.T0043"
|
|
1098
|
+
],
|
|
1099
|
+
"attack_refs": [
|
|
1100
|
+
"T1195.001",
|
|
1101
|
+
"T1565"
|
|
1102
|
+
],
|
|
1103
|
+
"framework_gaps": [
|
|
1104
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
1105
|
+
"NIST-800-218-SSDF",
|
|
1106
|
+
"NIST-AI-RMF-MEASURE-2.5",
|
|
1107
|
+
"OWASP-LLM-Top-10-2025-LLM08",
|
|
1108
|
+
"SLSA-v1.0-Build-L3"
|
|
1109
|
+
],
|
|
1110
|
+
"rfc_refs": [
|
|
1111
|
+
"RFC-8032"
|
|
1112
|
+
],
|
|
1113
|
+
"cwe_refs": [
|
|
1114
|
+
"CWE-1357",
|
|
1115
|
+
"CWE-1395",
|
|
1116
|
+
"CWE-1426",
|
|
1117
|
+
"CWE-502"
|
|
1118
|
+
],
|
|
1119
|
+
"d3fend_refs": [],
|
|
1120
|
+
"dlp_refs": []
|
|
1121
|
+
},
|
|
1122
|
+
{
|
|
1123
|
+
"name": "ot-ics-security",
|
|
1124
|
+
"version": "1.0.0",
|
|
1125
|
+
"triggers": [
|
|
1126
|
+
"air gap",
|
|
1127
|
+
"hmi security",
|
|
1128
|
+
"ics security",
|
|
1129
|
+
"iec 62443",
|
|
1130
|
+
"industrial control",
|
|
1131
|
+
"it ot convergence",
|
|
1132
|
+
"level 0",
|
|
1133
|
+
"level 1",
|
|
1134
|
+
"nerc cip",
|
|
1135
|
+
"nist 800-82",
|
|
1136
|
+
"operational technology",
|
|
1137
|
+
"ot security",
|
|
1138
|
+
"plc security",
|
|
1139
|
+
"purdue",
|
|
1140
|
+
"scada"
|
|
1141
|
+
],
|
|
1142
|
+
"data_deps": [
|
|
1143
|
+
"atlas-ttps.json",
|
|
1144
|
+
"cve-catalog.json",
|
|
1145
|
+
"cwe-catalog.json",
|
|
1146
|
+
"d3fend-catalog.json",
|
|
1147
|
+
"framework-control-gaps.json"
|
|
1148
|
+
],
|
|
1149
|
+
"atlas_refs": [
|
|
1150
|
+
"AML.T0010"
|
|
1151
|
+
],
|
|
1152
|
+
"attack_refs": [
|
|
1153
|
+
"T0855",
|
|
1154
|
+
"T0883",
|
|
1155
|
+
"T1068",
|
|
1156
|
+
"T1190"
|
|
1157
|
+
],
|
|
1158
|
+
"framework_gaps": [
|
|
1159
|
+
"IEC-62443-3-3",
|
|
1160
|
+
"NERC-CIP-007-6-R4",
|
|
1161
|
+
"NIS2-Art21-patch-management",
|
|
1162
|
+
"NIST-800-82r3"
|
|
1163
|
+
],
|
|
1164
|
+
"rfc_refs": [],
|
|
1165
|
+
"cwe_refs": [
|
|
1166
|
+
"CWE-1037",
|
|
1167
|
+
"CWE-287",
|
|
1168
|
+
"CWE-306",
|
|
1169
|
+
"CWE-798"
|
|
1170
|
+
],
|
|
1171
|
+
"d3fend_refs": [],
|
|
1172
|
+
"dlp_refs": []
|
|
1173
|
+
},
|
|
1174
|
+
{
|
|
1175
|
+
"name": "policy-exception-gen",
|
|
1176
|
+
"version": "1.0.0",
|
|
1177
|
+
"triggers": [
|
|
1178
|
+
"ai pipeline exception",
|
|
1179
|
+
"compensating control",
|
|
1180
|
+
"control exception",
|
|
1181
|
+
"ephemeral exception",
|
|
1182
|
+
"exception request",
|
|
1183
|
+
"policy exception",
|
|
1184
|
+
"serverless exception",
|
|
1185
|
+
"zero trust exception"
|
|
1186
|
+
],
|
|
1187
|
+
"data_deps": [
|
|
1188
|
+
"framework-control-gaps.json",
|
|
1189
|
+
"global-frameworks.json"
|
|
1190
|
+
],
|
|
1191
|
+
"atlas_refs": [],
|
|
1192
|
+
"attack_refs": [],
|
|
1193
|
+
"framework_gaps": [],
|
|
1194
|
+
"rfc_refs": [],
|
|
1195
|
+
"cwe_refs": [
|
|
1196
|
+
"CWE-1188"
|
|
1197
|
+
],
|
|
1198
|
+
"d3fend_refs": [],
|
|
1199
|
+
"dlp_refs": []
|
|
1200
|
+
},
|
|
1201
|
+
{
|
|
1202
|
+
"name": "pqc-first",
|
|
1203
|
+
"version": "1.0.0",
|
|
1204
|
+
"triggers": [
|
|
1205
|
+
"crypto migration",
|
|
1206
|
+
"fips 203",
|
|
1207
|
+
"fips 204",
|
|
1208
|
+
"fips 205",
|
|
1209
|
+
"harvest now decrypt later",
|
|
1210
|
+
"ml-dsa",
|
|
1211
|
+
"ml-kem",
|
|
1212
|
+
"openssl pqc",
|
|
1213
|
+
"post-quantum",
|
|
1214
|
+
"pqc",
|
|
1215
|
+
"quantum cryptography",
|
|
1216
|
+
"quantum migration",
|
|
1217
|
+
"quantum safe",
|
|
1218
|
+
"slh-dsa"
|
|
1219
|
+
],
|
|
1220
|
+
"data_deps": [
|
|
1221
|
+
"cve-catalog.json",
|
|
1222
|
+
"framework-control-gaps.json"
|
|
1223
|
+
],
|
|
1224
|
+
"atlas_refs": [],
|
|
1225
|
+
"attack_refs": [],
|
|
1226
|
+
"framework_gaps": [
|
|
1227
|
+
"NIST-800-53-SC-28",
|
|
1228
|
+
"NIST-800-53-SC-8"
|
|
1229
|
+
],
|
|
1230
|
+
"rfc_refs": [
|
|
1231
|
+
"DRAFT-IETF-TLS-ECDHE-MLKEM",
|
|
1232
|
+
"DRAFT-IETF-TLS-HYBRID-DESIGN",
|
|
1233
|
+
"RFC-8032",
|
|
1234
|
+
"RFC-8446",
|
|
1235
|
+
"RFC-9106",
|
|
1236
|
+
"RFC-9180",
|
|
1237
|
+
"RFC-9420",
|
|
1238
|
+
"RFC-9794"
|
|
1239
|
+
],
|
|
1240
|
+
"cwe_refs": [
|
|
1241
|
+
"CWE-327"
|
|
1242
|
+
],
|
|
1243
|
+
"d3fend_refs": [
|
|
1244
|
+
"D3-FE",
|
|
1245
|
+
"D3-MENCR"
|
|
1246
|
+
],
|
|
1247
|
+
"dlp_refs": []
|
|
1248
|
+
},
|
|
1249
|
+
{
|
|
1250
|
+
"name": "rag-pipeline-security",
|
|
1251
|
+
"version": "1.0.0",
|
|
1252
|
+
"triggers": [
|
|
1253
|
+
"embedding attack",
|
|
1254
|
+
"knowledge base security",
|
|
1255
|
+
"rag security",
|
|
1256
|
+
"rag threat model",
|
|
1257
|
+
"retrieval security",
|
|
1258
|
+
"vector poisoning",
|
|
1259
|
+
"vector store security"
|
|
1260
|
+
],
|
|
1261
|
+
"data_deps": [
|
|
1262
|
+
"atlas-ttps.json",
|
|
1263
|
+
"framework-control-gaps.json"
|
|
1264
|
+
],
|
|
1265
|
+
"atlas_refs": [
|
|
1266
|
+
"AML.T0020",
|
|
1267
|
+
"AML.T0043",
|
|
1268
|
+
"AML.T0051",
|
|
1269
|
+
"AML.T0054"
|
|
1270
|
+
],
|
|
1271
|
+
"attack_refs": [
|
|
1272
|
+
"T1565"
|
|
1273
|
+
],
|
|
1274
|
+
"framework_gaps": [
|
|
1275
|
+
"ISO-27001-2022-A.8.28",
|
|
1276
|
+
"NIST-800-53-SI-12",
|
|
1277
|
+
"NIST-AI-RMF-MEASURE-2.5",
|
|
1278
|
+
"OWASP-LLM-Top-10-2025-LLM08"
|
|
1279
|
+
],
|
|
1280
|
+
"rfc_refs": [],
|
|
1281
|
+
"cwe_refs": [
|
|
1282
|
+
"CWE-1395",
|
|
1283
|
+
"CWE-1426"
|
|
1284
|
+
],
|
|
1285
|
+
"d3fend_refs": [
|
|
1286
|
+
"D3-CSPP",
|
|
1287
|
+
"D3-IOPR",
|
|
1288
|
+
"D3-NTA"
|
|
1289
|
+
],
|
|
1290
|
+
"dlp_refs": []
|
|
1291
|
+
},
|
|
1292
|
+
{
|
|
1293
|
+
"name": "researcher",
|
|
1294
|
+
"version": "1.0.0",
|
|
1295
|
+
"triggers": [
|
|
1296
|
+
"exceptd research",
|
|
1297
|
+
"new advisory",
|
|
1298
|
+
"new exploit",
|
|
1299
|
+
"new threat",
|
|
1300
|
+
"research this cve",
|
|
1301
|
+
"threat intel triage",
|
|
1302
|
+
"triage threat",
|
|
1303
|
+
"what should I do about",
|
|
1304
|
+
"where do I start",
|
|
1305
|
+
"which skill should I use"
|
|
1306
|
+
],
|
|
1307
|
+
"data_deps": [
|
|
1308
|
+
"atlas-ttps.json",
|
|
1309
|
+
"cve-catalog.json",
|
|
1310
|
+
"exploit-availability.json",
|
|
1311
|
+
"framework-control-gaps.json",
|
|
1312
|
+
"global-frameworks.json",
|
|
1313
|
+
"zeroday-lessons.json"
|
|
1314
|
+
],
|
|
1315
|
+
"atlas_refs": [],
|
|
1316
|
+
"attack_refs": [],
|
|
1317
|
+
"framework_gaps": [],
|
|
1318
|
+
"rfc_refs": [],
|
|
1319
|
+
"cwe_refs": [],
|
|
1320
|
+
"d3fend_refs": [],
|
|
1321
|
+
"dlp_refs": []
|
|
1322
|
+
},
|
|
1323
|
+
{
|
|
1324
|
+
"name": "sector-energy",
|
|
1325
|
+
"version": "1.0.0",
|
|
1326
|
+
"triggers": [
|
|
1327
|
+
"aescsf",
|
|
1328
|
+
"awwa cyber",
|
|
1329
|
+
"der security",
|
|
1330
|
+
"electric grid security",
|
|
1331
|
+
"energy security",
|
|
1332
|
+
"grid resilience",
|
|
1333
|
+
"inverter security",
|
|
1334
|
+
"nccs-g",
|
|
1335
|
+
"nerc cip",
|
|
1336
|
+
"oil gas cyber",
|
|
1337
|
+
"pipeline cyber",
|
|
1338
|
+
"renewable cyber",
|
|
1339
|
+
"smart meter security",
|
|
1340
|
+
"tsa sd-2021",
|
|
1341
|
+
"water utility cyber"
|
|
1342
|
+
],
|
|
1343
|
+
"data_deps": [
|
|
1344
|
+
"atlas-ttps.json",
|
|
1345
|
+
"cve-catalog.json",
|
|
1346
|
+
"cwe-catalog.json",
|
|
1347
|
+
"d3fend-catalog.json",
|
|
1348
|
+
"framework-control-gaps.json",
|
|
1349
|
+
"global-frameworks.json"
|
|
1350
|
+
],
|
|
1351
|
+
"atlas_refs": [],
|
|
1352
|
+
"attack_refs": [
|
|
1353
|
+
"T0855",
|
|
1354
|
+
"T0883",
|
|
1355
|
+
"T1078",
|
|
1356
|
+
"T1190"
|
|
1357
|
+
],
|
|
1358
|
+
"framework_gaps": [
|
|
1359
|
+
"IEC-62443-3-3",
|
|
1360
|
+
"NERC-CIP-007-6-R4",
|
|
1361
|
+
"NIS2-Art21-patch-management",
|
|
1362
|
+
"NIST-800-82r3"
|
|
1363
|
+
],
|
|
1364
|
+
"rfc_refs": [],
|
|
1365
|
+
"cwe_refs": [
|
|
1366
|
+
"CWE-1037",
|
|
1367
|
+
"CWE-287",
|
|
1368
|
+
"CWE-306",
|
|
1369
|
+
"CWE-798"
|
|
1370
|
+
],
|
|
1371
|
+
"d3fend_refs": [],
|
|
1372
|
+
"dlp_refs": []
|
|
1373
|
+
},
|
|
1374
|
+
{
|
|
1375
|
+
"name": "sector-federal-government",
|
|
1376
|
+
"version": "1.0.0",
|
|
1377
|
+
"triggers": [
|
|
1378
|
+
"cisa bod",
|
|
1379
|
+
"cisa ed",
|
|
1380
|
+
"cmmc",
|
|
1381
|
+
"cui",
|
|
1382
|
+
"eo 14028",
|
|
1383
|
+
"federal cyber",
|
|
1384
|
+
"federal zero trust",
|
|
1385
|
+
"fedramp",
|
|
1386
|
+
"fisma",
|
|
1387
|
+
"government cybersecurity",
|
|
1388
|
+
"jab authorization",
|
|
1389
|
+
"m-22-09",
|
|
1390
|
+
"nist 800-171",
|
|
1391
|
+
"nist 800-172",
|
|
1392
|
+
"omb m-24-04",
|
|
1393
|
+
"stateramp"
|
|
1394
|
+
],
|
|
1395
|
+
"data_deps": [
|
|
1396
|
+
"atlas-ttps.json",
|
|
1397
|
+
"cve-catalog.json",
|
|
1398
|
+
"cwe-catalog.json",
|
|
1399
|
+
"d3fend-catalog.json",
|
|
1400
|
+
"framework-control-gaps.json",
|
|
1401
|
+
"global-frameworks.json"
|
|
1402
|
+
],
|
|
1403
|
+
"atlas_refs": [],
|
|
1404
|
+
"attack_refs": [
|
|
1405
|
+
"T1190",
|
|
1406
|
+
"T1195.001",
|
|
1407
|
+
"T1554"
|
|
1408
|
+
],
|
|
1409
|
+
"framework_gaps": [
|
|
1410
|
+
"CMMC-2.0-Level-2",
|
|
1411
|
+
"FedRAMP-Rev5-Moderate",
|
|
1412
|
+
"NIST-800-218-SSDF",
|
|
1413
|
+
"SLSA-v1.0-Build-L3"
|
|
1414
|
+
],
|
|
1415
|
+
"rfc_refs": [
|
|
1416
|
+
"RFC-8032",
|
|
1417
|
+
"RFC-8446"
|
|
1418
|
+
],
|
|
1419
|
+
"cwe_refs": [
|
|
1420
|
+
"CWE-1357",
|
|
1421
|
+
"CWE-1395",
|
|
1422
|
+
"CWE-829"
|
|
1423
|
+
],
|
|
1424
|
+
"d3fend_refs": [],
|
|
1425
|
+
"dlp_refs": []
|
|
1426
|
+
},
|
|
1427
|
+
{
|
|
1428
|
+
"name": "sector-financial",
|
|
1429
|
+
"version": "1.0.0",
|
|
1430
|
+
"triggers": [
|
|
1431
|
+
"23 nycrr 500",
|
|
1432
|
+
"apra cps 234",
|
|
1433
|
+
"banking security",
|
|
1434
|
+
"cbest",
|
|
1435
|
+
"dora",
|
|
1436
|
+
"ffiec",
|
|
1437
|
+
"financial security",
|
|
1438
|
+
"icast",
|
|
1439
|
+
"mas trm",
|
|
1440
|
+
"nydfs",
|
|
1441
|
+
"psd2",
|
|
1442
|
+
"psd3",
|
|
1443
|
+
"sca",
|
|
1444
|
+
"strong customer authentication",
|
|
1445
|
+
"swift cscf",
|
|
1446
|
+
"tiber-eu",
|
|
1447
|
+
"tlpt"
|
|
1448
|
+
],
|
|
1449
|
+
"data_deps": [
|
|
1450
|
+
"atlas-ttps.json",
|
|
1451
|
+
"cve-catalog.json",
|
|
1452
|
+
"cwe-catalog.json",
|
|
1453
|
+
"d3fend-catalog.json",
|
|
1454
|
+
"dlp-controls.json",
|
|
1455
|
+
"framework-control-gaps.json",
|
|
1456
|
+
"global-frameworks.json"
|
|
1457
|
+
],
|
|
1458
|
+
"atlas_refs": [
|
|
1459
|
+
"AML.T0017",
|
|
1460
|
+
"AML.T0096"
|
|
1461
|
+
],
|
|
1462
|
+
"attack_refs": [
|
|
1463
|
+
"T1078",
|
|
1464
|
+
"T1190",
|
|
1465
|
+
"T1486",
|
|
1466
|
+
"T1567"
|
|
1467
|
+
],
|
|
1468
|
+
"framework_gaps": [
|
|
1469
|
+
"NIST-800-53-AC-2",
|
|
1470
|
+
"PSD2-RTS-SCA",
|
|
1471
|
+
"SOC2-CC6-logical-access",
|
|
1472
|
+
"SWIFT-CSCF-v2026-1.1"
|
|
1473
|
+
],
|
|
1474
|
+
"rfc_refs": [
|
|
1475
|
+
"RFC-7519",
|
|
1476
|
+
"RFC-8446",
|
|
1477
|
+
"RFC-8725",
|
|
1478
|
+
"RFC-9421"
|
|
1479
|
+
],
|
|
1480
|
+
"cwe_refs": [
|
|
1481
|
+
"CWE-287",
|
|
1482
|
+
"CWE-352",
|
|
1483
|
+
"CWE-798",
|
|
1484
|
+
"CWE-862",
|
|
1485
|
+
"CWE-863"
|
|
1486
|
+
],
|
|
1487
|
+
"d3fend_refs": [],
|
|
1488
|
+
"dlp_refs": []
|
|
1489
|
+
},
|
|
1490
|
+
{
|
|
1491
|
+
"name": "sector-healthcare",
|
|
1492
|
+
"version": "1.0.0",
|
|
1493
|
+
"triggers": [
|
|
1494
|
+
"ai diagnostic",
|
|
1495
|
+
"clinical decision support",
|
|
1496
|
+
"eu mdr",
|
|
1497
|
+
"fda cyber",
|
|
1498
|
+
"fhir",
|
|
1499
|
+
"healthcare security",
|
|
1500
|
+
"hipaa",
|
|
1501
|
+
"hitrust",
|
|
1502
|
+
"hl7",
|
|
1503
|
+
"medical device security",
|
|
1504
|
+
"patient data",
|
|
1505
|
+
"phi",
|
|
1506
|
+
"protected health information",
|
|
1507
|
+
"samd"
|
|
1508
|
+
],
|
|
1509
|
+
"data_deps": [
|
|
1510
|
+
"atlas-ttps.json",
|
|
1511
|
+
"cve-catalog.json",
|
|
1512
|
+
"cwe-catalog.json",
|
|
1513
|
+
"d3fend-catalog.json",
|
|
1514
|
+
"dlp-controls.json",
|
|
1515
|
+
"framework-control-gaps.json",
|
|
1516
|
+
"global-frameworks.json"
|
|
1517
|
+
],
|
|
1518
|
+
"atlas_refs": [
|
|
1519
|
+
"AML.T0017",
|
|
1520
|
+
"AML.T0051"
|
|
1521
|
+
],
|
|
1522
|
+
"attack_refs": [
|
|
1523
|
+
"T1078",
|
|
1524
|
+
"T1530",
|
|
1525
|
+
"T1567"
|
|
1526
|
+
],
|
|
1527
|
+
"framework_gaps": [
|
|
1528
|
+
"HIPAA-Security-Rule-164.312(a)(1)",
|
|
1529
|
+
"HITRUST-CSF-v11.4-09.l",
|
|
1530
|
+
"ISO-27001-2022-A.8.30",
|
|
1531
|
+
"NIST-800-53-AC-2"
|
|
1532
|
+
],
|
|
1533
|
+
"rfc_refs": [
|
|
1534
|
+
"RFC-7519",
|
|
1535
|
+
"RFC-9421"
|
|
1536
|
+
],
|
|
1537
|
+
"cwe_refs": [
|
|
1538
|
+
"CWE-1426",
|
|
1539
|
+
"CWE-200",
|
|
1540
|
+
"CWE-287",
|
|
1541
|
+
"CWE-862"
|
|
1542
|
+
],
|
|
1543
|
+
"d3fend_refs": [],
|
|
1544
|
+
"dlp_refs": []
|
|
1545
|
+
},
|
|
1546
|
+
{
|
|
1547
|
+
"name": "security-maturity-tiers",
|
|
1548
|
+
"version": "1.0.0",
|
|
1549
|
+
"triggers": [
|
|
1550
|
+
"defense in depth",
|
|
1551
|
+
"how do we get from here to there",
|
|
1552
|
+
"implementation roadmap",
|
|
1553
|
+
"minimum viable security",
|
|
1554
|
+
"mvp security",
|
|
1555
|
+
"security best practices",
|
|
1556
|
+
"security maturity",
|
|
1557
|
+
"security roadmap",
|
|
1558
|
+
"security tiers",
|
|
1559
|
+
"what should we do first",
|
|
1560
|
+
"what's practical",
|
|
1561
|
+
"where to start"
|
|
1562
|
+
],
|
|
1563
|
+
"data_deps": [
|
|
1564
|
+
"cve-catalog.json",
|
|
1565
|
+
"framework-control-gaps.json",
|
|
1566
|
+
"global-frameworks.json"
|
|
1567
|
+
],
|
|
1568
|
+
"atlas_refs": [],
|
|
1569
|
+
"attack_refs": [],
|
|
1570
|
+
"framework_gaps": [],
|
|
1571
|
+
"rfc_refs": [],
|
|
1572
|
+
"cwe_refs": [
|
|
1573
|
+
"CWE-1188"
|
|
1574
|
+
],
|
|
1575
|
+
"d3fend_refs": [],
|
|
1576
|
+
"dlp_refs": []
|
|
1577
|
+
},
|
|
1578
|
+
{
|
|
1579
|
+
"name": "skill-update-loop",
|
|
1580
|
+
"version": "1.0.0",
|
|
1581
|
+
"triggers": [
|
|
1582
|
+
"are skills current",
|
|
1583
|
+
"atlas update",
|
|
1584
|
+
"check skill currency",
|
|
1585
|
+
"forward watch",
|
|
1586
|
+
"framework update",
|
|
1587
|
+
"new cve update",
|
|
1588
|
+
"skill maintenance",
|
|
1589
|
+
"skill review",
|
|
1590
|
+
"update skills",
|
|
1591
|
+
"update threat intel"
|
|
1592
|
+
],
|
|
1593
|
+
"data_deps": [
|
|
1594
|
+
"atlas-ttps.json",
|
|
1595
|
+
"cve-catalog.json",
|
|
1596
|
+
"exploit-availability.json",
|
|
1597
|
+
"framework-control-gaps.json",
|
|
1598
|
+
"global-frameworks.json",
|
|
1599
|
+
"zeroday-lessons.json"
|
|
1600
|
+
],
|
|
1601
|
+
"atlas_refs": [],
|
|
1602
|
+
"attack_refs": [],
|
|
1603
|
+
"framework_gaps": [],
|
|
1604
|
+
"rfc_refs": [],
|
|
1605
|
+
"cwe_refs": [],
|
|
1606
|
+
"d3fend_refs": [],
|
|
1607
|
+
"dlp_refs": []
|
|
1608
|
+
},
|
|
1609
|
+
{
|
|
1610
|
+
"name": "supply-chain-integrity",
|
|
1611
|
+
"version": "1.0.0",
|
|
1612
|
+
"triggers": [
|
|
1613
|
+
"ai bom",
|
|
1614
|
+
"aibom",
|
|
1615
|
+
"cosign",
|
|
1616
|
+
"csaf",
|
|
1617
|
+
"cyclonedx",
|
|
1618
|
+
"in-toto",
|
|
1619
|
+
"model provenance",
|
|
1620
|
+
"sbom",
|
|
1621
|
+
"sigstore",
|
|
1622
|
+
"slsa",
|
|
1623
|
+
"software composition",
|
|
1624
|
+
"spdx",
|
|
1625
|
+
"supply chain",
|
|
1626
|
+
"vex"
|
|
1627
|
+
],
|
|
1628
|
+
"data_deps": [
|
|
1629
|
+
"atlas-ttps.json",
|
|
1630
|
+
"cve-catalog.json",
|
|
1631
|
+
"cwe-catalog.json",
|
|
1632
|
+
"d3fend-catalog.json",
|
|
1633
|
+
"framework-control-gaps.json",
|
|
1634
|
+
"rfc-references.json"
|
|
1635
|
+
],
|
|
1636
|
+
"atlas_refs": [
|
|
1637
|
+
"AML.T0010",
|
|
1638
|
+
"AML.T0018"
|
|
1639
|
+
],
|
|
1640
|
+
"attack_refs": [
|
|
1641
|
+
"T1195.001",
|
|
1642
|
+
"T1195.002",
|
|
1643
|
+
"T1554"
|
|
1644
|
+
],
|
|
1645
|
+
"framework_gaps": [
|
|
1646
|
+
"CMMC-2.0-Level-2",
|
|
1647
|
+
"CycloneDX-v1.6-SBOM",
|
|
1648
|
+
"FedRAMP-Rev5-Moderate",
|
|
1649
|
+
"HITRUST-CSF-v11.4-09.l",
|
|
1650
|
+
"NIST-800-218-SSDF",
|
|
1651
|
+
"NIST-800-53-SA-12",
|
|
1652
|
+
"SLSA-v1.0-Build-L3",
|
|
1653
|
+
"SPDX-v3.0-SBOM",
|
|
1654
|
+
"SWIFT-CSCF-v2026-1.1",
|
|
1655
|
+
"VEX-CSAF-v2.1"
|
|
1656
|
+
],
|
|
1657
|
+
"rfc_refs": [
|
|
1658
|
+
"RFC-8032"
|
|
1659
|
+
],
|
|
1660
|
+
"cwe_refs": [
|
|
1661
|
+
"CWE-1357",
|
|
1662
|
+
"CWE-1395",
|
|
1663
|
+
"CWE-494",
|
|
1664
|
+
"CWE-502",
|
|
1665
|
+
"CWE-829"
|
|
1666
|
+
],
|
|
1667
|
+
"d3fend_refs": [
|
|
1668
|
+
"D3-CBAN",
|
|
1669
|
+
"D3-EAL",
|
|
1670
|
+
"D3-EHB"
|
|
1671
|
+
],
|
|
1672
|
+
"dlp_refs": []
|
|
1673
|
+
},
|
|
1674
|
+
{
|
|
1675
|
+
"name": "threat-model-currency",
|
|
1676
|
+
"version": "1.0.0",
|
|
1677
|
+
"triggers": [
|
|
1678
|
+
"is our threat model current",
|
|
1679
|
+
"threat intelligence gap",
|
|
1680
|
+
"threat model currency",
|
|
1681
|
+
"threat model gap",
|
|
1682
|
+
"threat model review",
|
|
1683
|
+
"update threat model"
|
|
1684
|
+
],
|
|
1685
|
+
"data_deps": [
|
|
1686
|
+
"atlas-ttps.json",
|
|
1687
|
+
"cve-catalog.json",
|
|
1688
|
+
"framework-control-gaps.json"
|
|
1689
|
+
],
|
|
1690
|
+
"atlas_refs": [],
|
|
1691
|
+
"attack_refs": [],
|
|
1692
|
+
"framework_gaps": [],
|
|
1693
|
+
"rfc_refs": [],
|
|
1694
|
+
"cwe_refs": [],
|
|
1695
|
+
"d3fend_refs": [],
|
|
1696
|
+
"dlp_refs": []
|
|
1697
|
+
},
|
|
1698
|
+
{
|
|
1699
|
+
"name": "threat-modeling-methodology",
|
|
1700
|
+
"version": "1.0.0",
|
|
1701
|
+
"triggers": [
|
|
1702
|
+
"attack tree",
|
|
1703
|
+
"data flow diagram",
|
|
1704
|
+
"dfd",
|
|
1705
|
+
"diamond model",
|
|
1706
|
+
"kill chain",
|
|
1707
|
+
"linddun",
|
|
1708
|
+
"pasta",
|
|
1709
|
+
"stride",
|
|
1710
|
+
"threat model",
|
|
1711
|
+
"threat modeling",
|
|
1712
|
+
"threat modeling methodology",
|
|
1713
|
+
"trust boundary",
|
|
1714
|
+
"unified kill chain"
|
|
1715
|
+
],
|
|
1716
|
+
"data_deps": [
|
|
1717
|
+
"atlas-ttps.json",
|
|
1718
|
+
"cve-catalog.json",
|
|
1719
|
+
"cwe-catalog.json",
|
|
1720
|
+
"d3fend-catalog.json",
|
|
1721
|
+
"framework-control-gaps.json"
|
|
1722
|
+
],
|
|
1723
|
+
"atlas_refs": [],
|
|
1724
|
+
"attack_refs": [],
|
|
1725
|
+
"framework_gaps": [
|
|
1726
|
+
"ISO-27001-2022-A.8.28",
|
|
1727
|
+
"ISO-IEC-23894-2023-clause-7",
|
|
1728
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
1729
|
+
"NIST-800-218-SSDF"
|
|
1730
|
+
],
|
|
1731
|
+
"rfc_refs": [],
|
|
1732
|
+
"cwe_refs": [],
|
|
1733
|
+
"d3fend_refs": [],
|
|
1734
|
+
"dlp_refs": []
|
|
1735
|
+
},
|
|
1736
|
+
{
|
|
1737
|
+
"name": "webapp-security",
|
|
1738
|
+
"version": "1.0.0",
|
|
1739
|
+
"triggers": [
|
|
1740
|
+
"ai generated code",
|
|
1741
|
+
"broken access control",
|
|
1742
|
+
"command injection",
|
|
1743
|
+
"csrf",
|
|
1744
|
+
"file upload",
|
|
1745
|
+
"owasp asvs",
|
|
1746
|
+
"owasp top 10",
|
|
1747
|
+
"path traversal",
|
|
1748
|
+
"sql injection",
|
|
1749
|
+
"sqli",
|
|
1750
|
+
"ssrf",
|
|
1751
|
+
"unsafe deserialization",
|
|
1752
|
+
"web application security",
|
|
1753
|
+
"webapp security",
|
|
1754
|
+
"xss"
|
|
1755
|
+
],
|
|
1756
|
+
"data_deps": [
|
|
1757
|
+
"atlas-ttps.json",
|
|
1758
|
+
"cve-catalog.json",
|
|
1759
|
+
"cwe-catalog.json",
|
|
1760
|
+
"d3fend-catalog.json",
|
|
1761
|
+
"framework-control-gaps.json",
|
|
1762
|
+
"rfc-references.json"
|
|
1763
|
+
],
|
|
1764
|
+
"atlas_refs": [
|
|
1765
|
+
"AML.T0051"
|
|
1766
|
+
],
|
|
1767
|
+
"attack_refs": [
|
|
1768
|
+
"T1059",
|
|
1769
|
+
"T1190",
|
|
1770
|
+
"T1505"
|
|
1771
|
+
],
|
|
1772
|
+
"framework_gaps": [
|
|
1773
|
+
"ISO-27001-2022-A.8.28",
|
|
1774
|
+
"NIST-800-218-SSDF",
|
|
1775
|
+
"OWASP-ASVS-v5.0-V14",
|
|
1776
|
+
"OWASP-LLM-Top-10-2025-LLM01"
|
|
1777
|
+
],
|
|
1778
|
+
"rfc_refs": [
|
|
1779
|
+
"RFC-7519",
|
|
1780
|
+
"RFC-8446",
|
|
1781
|
+
"RFC-8725",
|
|
1782
|
+
"RFC-9114"
|
|
1783
|
+
],
|
|
1784
|
+
"cwe_refs": [
|
|
1785
|
+
"CWE-1188",
|
|
1786
|
+
"CWE-200",
|
|
1787
|
+
"CWE-22",
|
|
1788
|
+
"CWE-269",
|
|
1789
|
+
"CWE-287",
|
|
1790
|
+
"CWE-352",
|
|
1791
|
+
"CWE-434",
|
|
1792
|
+
"CWE-502",
|
|
1793
|
+
"CWE-732",
|
|
1794
|
+
"CWE-77",
|
|
1795
|
+
"CWE-78",
|
|
1796
|
+
"CWE-79",
|
|
1797
|
+
"CWE-862",
|
|
1798
|
+
"CWE-863",
|
|
1799
|
+
"CWE-89",
|
|
1800
|
+
"CWE-918",
|
|
1801
|
+
"CWE-94"
|
|
1802
|
+
],
|
|
1803
|
+
"d3fend_refs": [],
|
|
1804
|
+
"dlp_refs": []
|
|
1805
|
+
},
|
|
1806
|
+
{
|
|
1807
|
+
"name": "zeroday-gap-learn",
|
|
1808
|
+
"version": "1.0.0",
|
|
1809
|
+
"triggers": [
|
|
1810
|
+
"0day learning",
|
|
1811
|
+
"exploit to control gap",
|
|
1812
|
+
"learn from exploit",
|
|
1813
|
+
"what control gap enabled this",
|
|
1814
|
+
"what should have caught this",
|
|
1815
|
+
"zero day lesson",
|
|
1816
|
+
"zeroday gap"
|
|
1817
|
+
],
|
|
1818
|
+
"data_deps": [
|
|
1819
|
+
"atlas-ttps.json",
|
|
1820
|
+
"cve-catalog.json",
|
|
1821
|
+
"framework-control-gaps.json",
|
|
1822
|
+
"zeroday-lessons.json"
|
|
1823
|
+
],
|
|
1824
|
+
"atlas_refs": [],
|
|
1825
|
+
"attack_refs": [],
|
|
1826
|
+
"framework_gaps": [],
|
|
1827
|
+
"rfc_refs": [],
|
|
1828
|
+
"cwe_refs": [],
|
|
1829
|
+
"d3fend_refs": [],
|
|
1830
|
+
"dlp_refs": []
|
|
1831
|
+
}
|
|
1832
|
+
]
|
|
1833
|
+
}
|