@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
package/manifest.json
ADDED
|
@@ -0,0 +1,2108 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "exceptd-security",
|
|
3
|
+
"version": "0.9.1",
|
|
4
|
+
"description": "AI security skills grounded in mid-2026 threat reality, not stale framework documentation",
|
|
5
|
+
"homepage": "https://exceptd.com",
|
|
6
|
+
"license": "Apache-2.0",
|
|
7
|
+
"atlas_version": "5.1.0",
|
|
8
|
+
"attack_version": "17",
|
|
9
|
+
"attack_version_date": "2025-06-25",
|
|
10
|
+
"threat_review_date": "2026-05-01",
|
|
11
|
+
"sources_dir": "sources/",
|
|
12
|
+
"agents_dir": "agents/",
|
|
13
|
+
"reports_dir": "reports/",
|
|
14
|
+
"skills": [
|
|
15
|
+
{
|
|
16
|
+
"name": "kernel-lpe-triage",
|
|
17
|
+
"version": "1.0.0",
|
|
18
|
+
"path": "skills/kernel-lpe-triage/skill.md",
|
|
19
|
+
"description": "Assess Linux kernel LPE exposure — Copy Fail, Dirty Frag, live-patch vs. reboot remediation",
|
|
20
|
+
"triggers": [
|
|
21
|
+
"kernel lpe",
|
|
22
|
+
"privilege escalation",
|
|
23
|
+
"copy fail",
|
|
24
|
+
"dirty frag",
|
|
25
|
+
"cve-2026-31431",
|
|
26
|
+
"cve-2026-43284",
|
|
27
|
+
"linux root",
|
|
28
|
+
"kernel patch",
|
|
29
|
+
"live kernel patch"
|
|
30
|
+
],
|
|
31
|
+
"data_deps": [
|
|
32
|
+
"cve-catalog.json",
|
|
33
|
+
"exploit-availability.json"
|
|
34
|
+
],
|
|
35
|
+
"atlas_refs": [],
|
|
36
|
+
"attack_refs": [
|
|
37
|
+
"T1068",
|
|
38
|
+
"T1548.001"
|
|
39
|
+
],
|
|
40
|
+
"framework_gaps": [
|
|
41
|
+
"NIST-800-53-SI-2",
|
|
42
|
+
"ISO-27001-2022-A.8.8",
|
|
43
|
+
"PCI-DSS-4.0-6.3.3",
|
|
44
|
+
"NIS2-Art21-patch-management",
|
|
45
|
+
"NIST-800-53-SC-8",
|
|
46
|
+
"CIS-Controls-v8-Control7"
|
|
47
|
+
],
|
|
48
|
+
"rfc_refs": [
|
|
49
|
+
"RFC-4301",
|
|
50
|
+
"RFC-4303",
|
|
51
|
+
"RFC-7296"
|
|
52
|
+
],
|
|
53
|
+
"last_threat_review": "2026-05-01",
|
|
54
|
+
"signature": "WprHkO1KOjQtCBj6/EJghBTNyNKJhn7O2HDbAQZPi5jn4flwHpSrtP8LC15a4Unoh+xiIIgGhvTHZIQFHGMpBQ==",
|
|
55
|
+
"signed_at": "2026-05-11T23:30:00.498Z",
|
|
56
|
+
"cwe_refs": [
|
|
57
|
+
"CWE-125",
|
|
58
|
+
"CWE-362",
|
|
59
|
+
"CWE-416",
|
|
60
|
+
"CWE-672",
|
|
61
|
+
"CWE-787"
|
|
62
|
+
],
|
|
63
|
+
"d3fend_refs": [
|
|
64
|
+
"D3-ASLR",
|
|
65
|
+
"D3-EAL",
|
|
66
|
+
"D3-PHRA",
|
|
67
|
+
"D3-PSEP"
|
|
68
|
+
]
|
|
69
|
+
},
|
|
70
|
+
{
|
|
71
|
+
"name": "ai-attack-surface",
|
|
72
|
+
"version": "1.0.0",
|
|
73
|
+
"path": "skills/ai-attack-surface/skill.md",
|
|
74
|
+
"description": "Comprehensive AI/ML attack surface assessment mapped to MITRE ATLAS v5.1.0 with gap flags",
|
|
75
|
+
"triggers": [
|
|
76
|
+
"ai attack surface",
|
|
77
|
+
"prompt injection",
|
|
78
|
+
"llm security",
|
|
79
|
+
"ai security assessment",
|
|
80
|
+
"model security",
|
|
81
|
+
"ai threat model",
|
|
82
|
+
"ai red team",
|
|
83
|
+
"promptsteal",
|
|
84
|
+
"promptflux"
|
|
85
|
+
],
|
|
86
|
+
"data_deps": [
|
|
87
|
+
"cve-catalog.json",
|
|
88
|
+
"atlas-ttps.json",
|
|
89
|
+
"framework-control-gaps.json"
|
|
90
|
+
],
|
|
91
|
+
"atlas_refs": [
|
|
92
|
+
"AML.T0043",
|
|
93
|
+
"AML.T0051",
|
|
94
|
+
"AML.T0054",
|
|
95
|
+
"AML.T0020",
|
|
96
|
+
"AML.T0096",
|
|
97
|
+
"AML.T0016",
|
|
98
|
+
"AML.T0017",
|
|
99
|
+
"AML.T0018"
|
|
100
|
+
],
|
|
101
|
+
"attack_refs": [
|
|
102
|
+
"T1566",
|
|
103
|
+
"T1059",
|
|
104
|
+
"T1190"
|
|
105
|
+
],
|
|
106
|
+
"framework_gaps": [
|
|
107
|
+
"ALL-AI-PIPELINE-INTEGRITY",
|
|
108
|
+
"ALL-PROMPT-INJECTION-ACCESS-CONTROL",
|
|
109
|
+
"ISO-27001-2022-A.8.28",
|
|
110
|
+
"ISO-IEC-23894-2023-clause-7",
|
|
111
|
+
"NIST-800-53-AC-2",
|
|
112
|
+
"NIST-800-53-SI-3",
|
|
113
|
+
"OWASP-LLM-Top-10-2025-LLM01",
|
|
114
|
+
"OWASP-LLM-Top-10-2025-LLM02",
|
|
115
|
+
"SOC2-CC6-logical-access"
|
|
116
|
+
],
|
|
117
|
+
"last_threat_review": "2026-05-01",
|
|
118
|
+
"signature": "fg20bOXGRkPUdLmegeXpTM4hnzl/ArgcVc88rItZN5DdsnFnzPgUU1PwCI82zooyj2GfxJHYjxNkq5qd2zNPBg==",
|
|
119
|
+
"signed_at": "2026-05-11T23:30:00.500Z",
|
|
120
|
+
"cwe_refs": [
|
|
121
|
+
"CWE-1039",
|
|
122
|
+
"CWE-1426",
|
|
123
|
+
"CWE-94"
|
|
124
|
+
],
|
|
125
|
+
"d3fend_refs": [
|
|
126
|
+
"D3-IOPR",
|
|
127
|
+
"D3-NTA"
|
|
128
|
+
]
|
|
129
|
+
},
|
|
130
|
+
{
|
|
131
|
+
"name": "mcp-agent-trust",
|
|
132
|
+
"version": "1.0.0",
|
|
133
|
+
"path": "skills/mcp-agent-trust/skill.md",
|
|
134
|
+
"description": "Enumerate MCP trust boundary failures — tool allowlisting, signed manifests, bearer auth, zero-interaction RCE",
|
|
135
|
+
"triggers": [
|
|
136
|
+
"mcp security",
|
|
137
|
+
"model context protocol",
|
|
138
|
+
"agent trust",
|
|
139
|
+
"tool trust",
|
|
140
|
+
"mcp rce",
|
|
141
|
+
"cve-2026-30615",
|
|
142
|
+
"cursor security",
|
|
143
|
+
"windsurf security",
|
|
144
|
+
"claude code security",
|
|
145
|
+
"ai agent security"
|
|
146
|
+
],
|
|
147
|
+
"data_deps": [
|
|
148
|
+
"cve-catalog.json",
|
|
149
|
+
"atlas-ttps.json",
|
|
150
|
+
"framework-control-gaps.json"
|
|
151
|
+
],
|
|
152
|
+
"atlas_refs": [
|
|
153
|
+
"AML.T0010",
|
|
154
|
+
"AML.T0016",
|
|
155
|
+
"AML.T0096"
|
|
156
|
+
],
|
|
157
|
+
"attack_refs": [
|
|
158
|
+
"T1195.001",
|
|
159
|
+
"T1059",
|
|
160
|
+
"T1190"
|
|
161
|
+
],
|
|
162
|
+
"framework_gaps": [
|
|
163
|
+
"ALL-MCP-TOOL-TRUST",
|
|
164
|
+
"ISO-27001-2022-A.8.30",
|
|
165
|
+
"NIST-800-53-CM-7",
|
|
166
|
+
"NIST-800-53-SA-12",
|
|
167
|
+
"OWASP-LLM-Top-10-2025-LLM06",
|
|
168
|
+
"SOC2-CC9-vendor-management",
|
|
169
|
+
"SWIFT-CSCF-v2026-1.1"
|
|
170
|
+
],
|
|
171
|
+
"rfc_refs": [
|
|
172
|
+
"RFC-6749",
|
|
173
|
+
"RFC-7519",
|
|
174
|
+
"RFC-8446",
|
|
175
|
+
"RFC-8725",
|
|
176
|
+
"RFC-9114",
|
|
177
|
+
"RFC-9421",
|
|
178
|
+
"RFC-9700"
|
|
179
|
+
],
|
|
180
|
+
"last_threat_review": "2026-05-01",
|
|
181
|
+
"signature": "6JuSzkSSFzFHEZ3ANzqjtIbKPOkwJeKhQ+8WAPB4+dTRvDSeg46n3D88XfGaNd2z7pmg/i8p9ZoImQcHFS4BCg==",
|
|
182
|
+
"signed_at": "2026-05-11T23:30:00.500Z",
|
|
183
|
+
"cwe_refs": [
|
|
184
|
+
"CWE-22",
|
|
185
|
+
"CWE-345",
|
|
186
|
+
"CWE-352",
|
|
187
|
+
"CWE-434",
|
|
188
|
+
"CWE-494",
|
|
189
|
+
"CWE-77",
|
|
190
|
+
"CWE-918",
|
|
191
|
+
"CWE-94"
|
|
192
|
+
],
|
|
193
|
+
"d3fend_refs": [
|
|
194
|
+
"D3-CBAN",
|
|
195
|
+
"D3-CSPP",
|
|
196
|
+
"D3-EAL",
|
|
197
|
+
"D3-EHB",
|
|
198
|
+
"D3-MFA"
|
|
199
|
+
]
|
|
200
|
+
},
|
|
201
|
+
{
|
|
202
|
+
"name": "framework-gap-analysis",
|
|
203
|
+
"version": "1.0.0",
|
|
204
|
+
"path": "skills/framework-gap-analysis/skill.md",
|
|
205
|
+
"description": "Feed a framework control ID and threat scenario — receive the gap between what the control covers and what current TTPs require",
|
|
206
|
+
"triggers": [
|
|
207
|
+
"framework gap",
|
|
208
|
+
"control gap",
|
|
209
|
+
"nist gap",
|
|
210
|
+
"iso 27001 gap",
|
|
211
|
+
"soc 2 gap",
|
|
212
|
+
"pci gap",
|
|
213
|
+
"nis2 gap",
|
|
214
|
+
"compliance gap",
|
|
215
|
+
"why doesn't this control cover"
|
|
216
|
+
],
|
|
217
|
+
"data_deps": [
|
|
218
|
+
"framework-control-gaps.json",
|
|
219
|
+
"atlas-ttps.json",
|
|
220
|
+
"cve-catalog.json",
|
|
221
|
+
"global-frameworks.json"
|
|
222
|
+
],
|
|
223
|
+
"atlas_refs": [],
|
|
224
|
+
"attack_refs": [],
|
|
225
|
+
"framework_gaps": [],
|
|
226
|
+
"last_threat_review": "2026-05-01",
|
|
227
|
+
"signature": "PYSw9abiYfW+y7IkY8udJG5LSds2a4rMimlw3rrdD0zE3vunEeV/y7oTmDD4o83OqHSCKNzF/7vMhvd/noqICQ==",
|
|
228
|
+
"signed_at": "2026-05-11T23:30:00.500Z"
|
|
229
|
+
},
|
|
230
|
+
{
|
|
231
|
+
"name": "compliance-theater",
|
|
232
|
+
"version": "1.0.0",
|
|
233
|
+
"path": "skills/compliance-theater/skill.md",
|
|
234
|
+
"description": "Detect where an organization passes an audit but remains exposed — seven documented compliance theater patterns",
|
|
235
|
+
"triggers": [
|
|
236
|
+
"compliance theater",
|
|
237
|
+
"paper compliance",
|
|
238
|
+
"audit but exposed",
|
|
239
|
+
"compliant but vulnerable",
|
|
240
|
+
"compliance gap",
|
|
241
|
+
"checkbox security",
|
|
242
|
+
"audit theater"
|
|
243
|
+
],
|
|
244
|
+
"data_deps": [
|
|
245
|
+
"framework-control-gaps.json",
|
|
246
|
+
"cve-catalog.json",
|
|
247
|
+
"exploit-availability.json"
|
|
248
|
+
],
|
|
249
|
+
"atlas_refs": [],
|
|
250
|
+
"attack_refs": [],
|
|
251
|
+
"framework_gaps": [
|
|
252
|
+
"ALL-AI-PIPELINE-INTEGRITY",
|
|
253
|
+
"ALL-PROMPT-INJECTION-ACCESS-CONTROL",
|
|
254
|
+
"FedRAMP-Rev5-Moderate",
|
|
255
|
+
"CMMC-2.0-Level-2"
|
|
256
|
+
],
|
|
257
|
+
"last_threat_review": "2026-05-01",
|
|
258
|
+
"signature": "BMFmmJYP3HsHIjUqnhw8E3MiMGZJsI/eDq51we+nxUicZ8nFUQT9DhmRntAqOs6BUnsfiQNNLc/rrsNh8yg1CQ==",
|
|
259
|
+
"signed_at": "2026-05-11T23:30:00.501Z"
|
|
260
|
+
},
|
|
261
|
+
{
|
|
262
|
+
"name": "exploit-scoring",
|
|
263
|
+
"version": "1.0.0",
|
|
264
|
+
"path": "skills/exploit-scoring/skill.md",
|
|
265
|
+
"description": "Real-World Exploit Priority (RWEP) scoring — CVSS plus KEV, PoC, AI-acceleration, blast radius, live-patch factors",
|
|
266
|
+
"triggers": [
|
|
267
|
+
"exploit scoring",
|
|
268
|
+
"rwep",
|
|
269
|
+
"real world priority",
|
|
270
|
+
"how bad is this cve",
|
|
271
|
+
"prioritize cve",
|
|
272
|
+
"cve priority",
|
|
273
|
+
"patch priority",
|
|
274
|
+
"beyond cvss"
|
|
275
|
+
],
|
|
276
|
+
"data_deps": [
|
|
277
|
+
"cve-catalog.json",
|
|
278
|
+
"exploit-availability.json"
|
|
279
|
+
],
|
|
280
|
+
"atlas_refs": [],
|
|
281
|
+
"attack_refs": [],
|
|
282
|
+
"framework_gaps": [
|
|
283
|
+
"CWE-Top-25-2024-meta",
|
|
284
|
+
"CIS-Controls-v8-Control7"
|
|
285
|
+
],
|
|
286
|
+
"last_threat_review": "2026-05-01",
|
|
287
|
+
"signature": "VGPyDwy5BRlpn1lZthhPB6ytb4ZcU2j0KtCZbaMkyLdMugQJtK2yEuwrsDH4yEtAhTB6/A4B3eSygJckum49Ag==",
|
|
288
|
+
"signed_at": "2026-05-11T23:30:00.502Z"
|
|
289
|
+
},
|
|
290
|
+
{
|
|
291
|
+
"name": "rag-pipeline-security",
|
|
292
|
+
"version": "1.0.0",
|
|
293
|
+
"path": "skills/rag-pipeline-security/skill.md",
|
|
294
|
+
"description": "RAG-specific threat model — embedding manipulation, vector store poisoning, retrieval filter bypass, indirect prompt injection",
|
|
295
|
+
"triggers": [
|
|
296
|
+
"rag security",
|
|
297
|
+
"retrieval security",
|
|
298
|
+
"vector store security",
|
|
299
|
+
"embedding attack",
|
|
300
|
+
"rag threat model",
|
|
301
|
+
"knowledge base security",
|
|
302
|
+
"vector poisoning"
|
|
303
|
+
],
|
|
304
|
+
"data_deps": [
|
|
305
|
+
"atlas-ttps.json",
|
|
306
|
+
"framework-control-gaps.json"
|
|
307
|
+
],
|
|
308
|
+
"atlas_refs": [
|
|
309
|
+
"AML.T0020",
|
|
310
|
+
"AML.T0043",
|
|
311
|
+
"AML.T0051",
|
|
312
|
+
"AML.T0054"
|
|
313
|
+
],
|
|
314
|
+
"attack_refs": [
|
|
315
|
+
"T1565"
|
|
316
|
+
],
|
|
317
|
+
"framework_gaps": [
|
|
318
|
+
"ISO-27001-2022-A.8.28",
|
|
319
|
+
"NIST-800-53-SI-12",
|
|
320
|
+
"NIST-AI-RMF-MEASURE-2.5",
|
|
321
|
+
"OWASP-LLM-Top-10-2025-LLM08"
|
|
322
|
+
],
|
|
323
|
+
"last_threat_review": "2026-05-01",
|
|
324
|
+
"signature": "XkFGpsNnXBVslkQ48usEu9l1LjPiV2ppW+M4B63zXFBP2Puh52qYCffEPjUHYhoO5bjgTM7yCbK8XF/Dzk5wBw==",
|
|
325
|
+
"signed_at": "2026-05-11T23:30:00.502Z",
|
|
326
|
+
"cwe_refs": [
|
|
327
|
+
"CWE-1395",
|
|
328
|
+
"CWE-1426"
|
|
329
|
+
],
|
|
330
|
+
"d3fend_refs": [
|
|
331
|
+
"D3-CSPP",
|
|
332
|
+
"D3-IOPR",
|
|
333
|
+
"D3-NTA"
|
|
334
|
+
]
|
|
335
|
+
},
|
|
336
|
+
{
|
|
337
|
+
"name": "ai-c2-detection",
|
|
338
|
+
"version": "1.0.0",
|
|
339
|
+
"path": "skills/ai-c2-detection/skill.md",
|
|
340
|
+
"description": "Detect adversary use of AI APIs as covert C2 — SesameOp pattern, PROMPTFLUX/PROMPTSTEAL behavioral signatures",
|
|
341
|
+
"triggers": [
|
|
342
|
+
"ai c2",
|
|
343
|
+
"ai command and control",
|
|
344
|
+
"sesameop",
|
|
345
|
+
"promptflux",
|
|
346
|
+
"promptsteal",
|
|
347
|
+
"ai api abuse",
|
|
348
|
+
"llm c2",
|
|
349
|
+
"covert channel ai",
|
|
350
|
+
"aml.t0096"
|
|
351
|
+
],
|
|
352
|
+
"data_deps": [
|
|
353
|
+
"atlas-ttps.json",
|
|
354
|
+
"cve-catalog.json",
|
|
355
|
+
"framework-control-gaps.json"
|
|
356
|
+
],
|
|
357
|
+
"atlas_refs": [
|
|
358
|
+
"AML.T0096",
|
|
359
|
+
"AML.T0017"
|
|
360
|
+
],
|
|
361
|
+
"attack_refs": [
|
|
362
|
+
"T1071",
|
|
363
|
+
"T1102",
|
|
364
|
+
"T1568"
|
|
365
|
+
],
|
|
366
|
+
"framework_gaps": [
|
|
367
|
+
"NIST-800-53-SI-3",
|
|
368
|
+
"NIST-800-53-SC-7",
|
|
369
|
+
"ISO-27001-2022-A.8.16",
|
|
370
|
+
"SOC2-CC7-anomaly-detection"
|
|
371
|
+
],
|
|
372
|
+
"rfc_refs": [
|
|
373
|
+
"RFC-8446",
|
|
374
|
+
"RFC-9180",
|
|
375
|
+
"RFC-9458",
|
|
376
|
+
"RFC-9421",
|
|
377
|
+
"RFC-9114",
|
|
378
|
+
"RFC-9000"
|
|
379
|
+
],
|
|
380
|
+
"last_threat_review": "2026-05-01",
|
|
381
|
+
"signature": "1Xqy7Kxxy6GpTvuYJPdllPzVDRFxb7N6AuxKuoaO4v91CiZLmiXt0sTIWImKJ3p9Eup6rJNDdsY71dolFhHNBA==",
|
|
382
|
+
"signed_at": "2026-05-11T23:30:00.502Z",
|
|
383
|
+
"d3fend_refs": [
|
|
384
|
+
"D3-CA",
|
|
385
|
+
"D3-CSPP",
|
|
386
|
+
"D3-DA",
|
|
387
|
+
"D3-IOPR",
|
|
388
|
+
"D3-NI",
|
|
389
|
+
"D3-NTA",
|
|
390
|
+
"D3-NTPM"
|
|
391
|
+
]
|
|
392
|
+
},
|
|
393
|
+
{
|
|
394
|
+
"name": "policy-exception-gen",
|
|
395
|
+
"version": "1.0.0",
|
|
396
|
+
"path": "skills/policy-exception-gen/skill.md",
|
|
397
|
+
"description": "Generate defensible policy exceptions for architectural realities — ephemeral infra, AI pipelines, ZTA, no-reboot patching",
|
|
398
|
+
"triggers": [
|
|
399
|
+
"policy exception",
|
|
400
|
+
"exception request",
|
|
401
|
+
"control exception",
|
|
402
|
+
"ephemeral exception",
|
|
403
|
+
"serverless exception",
|
|
404
|
+
"ai pipeline exception",
|
|
405
|
+
"zero trust exception",
|
|
406
|
+
"compensating control"
|
|
407
|
+
],
|
|
408
|
+
"data_deps": [
|
|
409
|
+
"framework-control-gaps.json",
|
|
410
|
+
"global-frameworks.json"
|
|
411
|
+
],
|
|
412
|
+
"atlas_refs": [],
|
|
413
|
+
"attack_refs": [],
|
|
414
|
+
"framework_gaps": [],
|
|
415
|
+
"last_threat_review": "2026-05-01",
|
|
416
|
+
"signature": "QNLOmAL54S/Cmk4cdO4L2BCGkqZ/FgY4UBsKWtg/EEW+YXF5ev+a8XsUT8q5veuUa2VYcYna7rD1iAnE+2PDBA==",
|
|
417
|
+
"signed_at": "2026-05-11T23:30:00.502Z",
|
|
418
|
+
"cwe_refs": [
|
|
419
|
+
"CWE-1188"
|
|
420
|
+
]
|
|
421
|
+
},
|
|
422
|
+
{
|
|
423
|
+
"name": "threat-model-currency",
|
|
424
|
+
"version": "1.0.0",
|
|
425
|
+
"path": "skills/threat-model-currency/skill.md",
|
|
426
|
+
"description": "Score how current an org's threat model is against 2026 reality — 14-item checklist, currency percentage, prioritized update roadmap",
|
|
427
|
+
"triggers": [
|
|
428
|
+
"threat model currency",
|
|
429
|
+
"update threat model",
|
|
430
|
+
"threat model review",
|
|
431
|
+
"is our threat model current",
|
|
432
|
+
"threat model gap",
|
|
433
|
+
"threat intelligence gap"
|
|
434
|
+
],
|
|
435
|
+
"data_deps": [
|
|
436
|
+
"atlas-ttps.json",
|
|
437
|
+
"cve-catalog.json",
|
|
438
|
+
"framework-control-gaps.json"
|
|
439
|
+
],
|
|
440
|
+
"atlas_refs": [],
|
|
441
|
+
"attack_refs": [],
|
|
442
|
+
"framework_gaps": [],
|
|
443
|
+
"last_threat_review": "2026-05-01",
|
|
444
|
+
"signature": "aFHq4cSl3CKchnVITxx+BrAEWD33WtFFJoQtwAug5g9R3/3ABtjaXYGVQaZcdcG1AIZkMoGSPywgLQWDY7ZDCw==",
|
|
445
|
+
"signed_at": "2026-05-11T23:30:00.503Z"
|
|
446
|
+
},
|
|
447
|
+
{
|
|
448
|
+
"name": "global-grc",
|
|
449
|
+
"version": "1.0.0",
|
|
450
|
+
"path": "skills/global-grc/skill.md",
|
|
451
|
+
"description": "Multi-jurisdiction GRC mapping — EU (GDPR/NIS2/DORA/EU AI Act/CRA), UK, AU, SG, JP, IN, CA, ISO 27001:2022, CSA CCM v4",
|
|
452
|
+
"triggers": [
|
|
453
|
+
"global grc",
|
|
454
|
+
"international compliance",
|
|
455
|
+
"gdpr security",
|
|
456
|
+
"nis2",
|
|
457
|
+
"dora compliance",
|
|
458
|
+
"eu ai act",
|
|
459
|
+
"cyber resilience act",
|
|
460
|
+
"mas trm",
|
|
461
|
+
"cert-in",
|
|
462
|
+
"essential 8",
|
|
463
|
+
"apra cps 234",
|
|
464
|
+
"multi-jurisdiction",
|
|
465
|
+
"global compliance"
|
|
466
|
+
],
|
|
467
|
+
"data_deps": [
|
|
468
|
+
"global-frameworks.json",
|
|
469
|
+
"framework-control-gaps.json",
|
|
470
|
+
"atlas-ttps.json"
|
|
471
|
+
],
|
|
472
|
+
"atlas_refs": [],
|
|
473
|
+
"attack_refs": [],
|
|
474
|
+
"framework_gaps": [],
|
|
475
|
+
"last_threat_review": "2026-05-01",
|
|
476
|
+
"signature": "viCTUWdy6euvd2KTAo6sLvarK/FZkDtYGocxBt0H+fY94kLQGW8K5cSpqIWdUF5NUytSHBCiG4YcSze8P9Z/BQ==",
|
|
477
|
+
"signed_at": "2026-05-11T23:30:00.503Z"
|
|
478
|
+
},
|
|
479
|
+
{
|
|
480
|
+
"name": "zeroday-gap-learn",
|
|
481
|
+
"version": "1.0.0",
|
|
482
|
+
"path": "skills/zeroday-gap-learn/skill.md",
|
|
483
|
+
"description": "Run the zero-day learning loop — CVE to attack vector to control gap to framework gap to new control requirement",
|
|
484
|
+
"triggers": [
|
|
485
|
+
"zero day lesson",
|
|
486
|
+
"zeroday gap",
|
|
487
|
+
"what control gap enabled this",
|
|
488
|
+
"learn from exploit",
|
|
489
|
+
"exploit to control gap",
|
|
490
|
+
"what should have caught this",
|
|
491
|
+
"0day learning"
|
|
492
|
+
],
|
|
493
|
+
"data_deps": [
|
|
494
|
+
"cve-catalog.json",
|
|
495
|
+
"zeroday-lessons.json",
|
|
496
|
+
"framework-control-gaps.json",
|
|
497
|
+
"atlas-ttps.json"
|
|
498
|
+
],
|
|
499
|
+
"atlas_refs": [],
|
|
500
|
+
"attack_refs": [],
|
|
501
|
+
"framework_gaps": [],
|
|
502
|
+
"last_threat_review": "2026-05-01",
|
|
503
|
+
"signature": "6PkUaHQi3Hxuqq/Jp4GYckvfqVEofmeT87NUH0T+pwyjlc+xZkoqNPn65f7ldciEPL86JIPi3/dDTKQbIFFBCw==",
|
|
504
|
+
"signed_at": "2026-05-11T23:30:00.503Z"
|
|
505
|
+
},
|
|
506
|
+
{
|
|
507
|
+
"name": "pqc-first",
|
|
508
|
+
"version": "1.0.0",
|
|
509
|
+
"path": "skills/pqc-first/skill.md",
|
|
510
|
+
"description": "Post-quantum cryptography first mentality — hard version gates (OpenSSL 3.5+), algorithm sunset tracking, HNDL assessment, loopback learning for NIST/IETF evolution",
|
|
511
|
+
"triggers": [
|
|
512
|
+
"pqc",
|
|
513
|
+
"post-quantum",
|
|
514
|
+
"quantum cryptography",
|
|
515
|
+
"quantum safe",
|
|
516
|
+
"ml-kem",
|
|
517
|
+
"ml-dsa",
|
|
518
|
+
"slh-dsa",
|
|
519
|
+
"harvest now decrypt later",
|
|
520
|
+
"quantum migration",
|
|
521
|
+
"crypto migration",
|
|
522
|
+
"openssl pqc",
|
|
523
|
+
"fips 203",
|
|
524
|
+
"fips 204",
|
|
525
|
+
"fips 205"
|
|
526
|
+
],
|
|
527
|
+
"data_deps": [
|
|
528
|
+
"cve-catalog.json",
|
|
529
|
+
"framework-control-gaps.json"
|
|
530
|
+
],
|
|
531
|
+
"atlas_refs": [],
|
|
532
|
+
"attack_refs": [],
|
|
533
|
+
"framework_gaps": [
|
|
534
|
+
"NIST-800-53-SC-8",
|
|
535
|
+
"NIST-800-53-SC-28"
|
|
536
|
+
],
|
|
537
|
+
"rfc_refs": [
|
|
538
|
+
"RFC-8446",
|
|
539
|
+
"DRAFT-IETF-TLS-ECDHE-MLKEM",
|
|
540
|
+
"DRAFT-IETF-TLS-HYBRID-DESIGN",
|
|
541
|
+
"RFC-9180",
|
|
542
|
+
"RFC-9420",
|
|
543
|
+
"RFC-9794",
|
|
544
|
+
"RFC-8032",
|
|
545
|
+
"RFC-9106"
|
|
546
|
+
],
|
|
547
|
+
"forward_watch": [
|
|
548
|
+
"FIPS 206 (HQC) finalization",
|
|
549
|
+
"X25519+ML-KEM TLS RFC publication",
|
|
550
|
+
"OpenSSL FIPS 140-3 certification",
|
|
551
|
+
"ENISA PQC mandate",
|
|
552
|
+
"CRQC timeline estimate changes"
|
|
553
|
+
],
|
|
554
|
+
"last_threat_review": "2026-05-01",
|
|
555
|
+
"signature": "ZenFTEzWx+DzrSXlNXhbZ70vOdJSXfrnKkAwqMlBf5nlDf38V1/hG4XCKj43snQXWr4mVJOX6ilqFLTYNIjnBw==",
|
|
556
|
+
"signed_at": "2026-05-11T23:30:00.504Z",
|
|
557
|
+
"cwe_refs": [
|
|
558
|
+
"CWE-327"
|
|
559
|
+
],
|
|
560
|
+
"d3fend_refs": [
|
|
561
|
+
"D3-FE",
|
|
562
|
+
"D3-MENCR"
|
|
563
|
+
]
|
|
564
|
+
},
|
|
565
|
+
{
|
|
566
|
+
"name": "skill-update-loop",
|
|
567
|
+
"version": "1.0.0",
|
|
568
|
+
"path": "skills/skill-update-loop/skill.md",
|
|
569
|
+
"description": "Meta-skill for keeping all exceptd skills current — CISA KEV triggers, ATLAS version updates, framework amendments, forward_watch resolution, currency scoring",
|
|
570
|
+
"triggers": [
|
|
571
|
+
"update skills",
|
|
572
|
+
"skill review",
|
|
573
|
+
"check skill currency",
|
|
574
|
+
"forward watch",
|
|
575
|
+
"are skills current",
|
|
576
|
+
"update threat intel",
|
|
577
|
+
"skill maintenance",
|
|
578
|
+
"new cve update",
|
|
579
|
+
"atlas update",
|
|
580
|
+
"framework update"
|
|
581
|
+
],
|
|
582
|
+
"data_deps": [
|
|
583
|
+
"cve-catalog.json",
|
|
584
|
+
"atlas-ttps.json",
|
|
585
|
+
"framework-control-gaps.json",
|
|
586
|
+
"global-frameworks.json",
|
|
587
|
+
"zeroday-lessons.json",
|
|
588
|
+
"exploit-availability.json"
|
|
589
|
+
],
|
|
590
|
+
"atlas_refs": [],
|
|
591
|
+
"attack_refs": [],
|
|
592
|
+
"framework_gaps": [],
|
|
593
|
+
"forward_watch": [
|
|
594
|
+
"MITRE ATLAS version releases",
|
|
595
|
+
"CISA KEV additions",
|
|
596
|
+
"NIST PQC standards finalization",
|
|
597
|
+
"Major kernel CVEs",
|
|
598
|
+
"AI/MCP platform CVEs",
|
|
599
|
+
"Framework publication updates"
|
|
600
|
+
],
|
|
601
|
+
"last_threat_review": "2026-05-01",
|
|
602
|
+
"signature": "ih0vpd2v2zS31JSJv7SnABoya8JlJdrXZXx4rBnrsV3Assj+dbjAP0pQ1HMT/5RX8yTTswRQsg0bJV3qmbJ3Bw==",
|
|
603
|
+
"signed_at": "2026-05-11T23:30:00.504Z"
|
|
604
|
+
},
|
|
605
|
+
{
|
|
606
|
+
"name": "security-maturity-tiers",
|
|
607
|
+
"version": "1.0.0",
|
|
608
|
+
"path": "skills/security-maturity-tiers/skill.md",
|
|
609
|
+
"description": "Three-tier implementation roadmap — MVP (ship this week), Practical (scalable today), Overkill (defense-in-depth)",
|
|
610
|
+
"triggers": [
|
|
611
|
+
"security maturity",
|
|
612
|
+
"implementation roadmap",
|
|
613
|
+
"what should we do first",
|
|
614
|
+
"security tiers",
|
|
615
|
+
"mvp security",
|
|
616
|
+
"where to start",
|
|
617
|
+
"security roadmap",
|
|
618
|
+
"minimum viable security",
|
|
619
|
+
"what's practical",
|
|
620
|
+
"security best practices",
|
|
621
|
+
"defense in depth",
|
|
622
|
+
"how do we get from here to there"
|
|
623
|
+
],
|
|
624
|
+
"data_deps": [
|
|
625
|
+
"cve-catalog.json",
|
|
626
|
+
"framework-control-gaps.json",
|
|
627
|
+
"global-frameworks.json"
|
|
628
|
+
],
|
|
629
|
+
"atlas_refs": [],
|
|
630
|
+
"attack_refs": [],
|
|
631
|
+
"framework_gaps": [],
|
|
632
|
+
"forward_watch": [
|
|
633
|
+
"New attack classes that change MVP requirements (especially zero-interaction RCE)",
|
|
634
|
+
"Framework updates that change minimum compliance baselines",
|
|
635
|
+
"New tooling that makes higher tiers more accessible",
|
|
636
|
+
"PQC tooling maturity shifting overkill to practical"
|
|
637
|
+
],
|
|
638
|
+
"last_threat_review": "2026-05-01",
|
|
639
|
+
"signature": "Lv8dHiwIqUbNsywCCB/+pYWGF+MHCvxVn1IAvR7Cnif5fy0sICv0N4SVsSb621qAAkHNshpfxqwuhbuQnE1TBA==",
|
|
640
|
+
"signed_at": "2026-05-11T23:30:00.505Z",
|
|
641
|
+
"cwe_refs": [
|
|
642
|
+
"CWE-1188"
|
|
643
|
+
]
|
|
644
|
+
},
|
|
645
|
+
{
|
|
646
|
+
"name": "researcher",
|
|
647
|
+
"version": "1.0.0",
|
|
648
|
+
"path": "skills/researcher/skill.md",
|
|
649
|
+
"description": "Triage entry-point for raw threat intel — researches an input across all exceptd data catalogs, RWEP-scores it, and routes the operator to the right specialized skill(s)",
|
|
650
|
+
"triggers": [
|
|
651
|
+
"research this cve",
|
|
652
|
+
"what should I do about",
|
|
653
|
+
"new threat",
|
|
654
|
+
"new advisory",
|
|
655
|
+
"new exploit",
|
|
656
|
+
"triage threat",
|
|
657
|
+
"where do I start",
|
|
658
|
+
"which skill should I use",
|
|
659
|
+
"threat intel triage",
|
|
660
|
+
"exceptd research"
|
|
661
|
+
],
|
|
662
|
+
"data_deps": [
|
|
663
|
+
"cve-catalog.json",
|
|
664
|
+
"atlas-ttps.json",
|
|
665
|
+
"framework-control-gaps.json",
|
|
666
|
+
"zeroday-lessons.json",
|
|
667
|
+
"exploit-availability.json",
|
|
668
|
+
"global-frameworks.json"
|
|
669
|
+
],
|
|
670
|
+
"atlas_refs": [],
|
|
671
|
+
"attack_refs": [],
|
|
672
|
+
"framework_gaps": [],
|
|
673
|
+
"last_threat_review": "2026-05-11",
|
|
674
|
+
"signature": "BS+wrL28HHYhBpe+v84VLoq9KPBXu6alfG968katfGIoLNYQueaHP931bRmlkrjfeb6qbDf067GWdPEh7nroAw==",
|
|
675
|
+
"signed_at": "2026-05-11T23:30:00.505Z"
|
|
676
|
+
},
|
|
677
|
+
{
|
|
678
|
+
"name": "attack-surface-pentest",
|
|
679
|
+
"version": "1.0.0",
|
|
680
|
+
"path": "skills/attack-surface-pentest/skill.md",
|
|
681
|
+
"description": "Modern attack surface management + pen testing methodology for AI-era environments — NIST 800-115, OWASP WSTG, PTES, ATT&CK-driven adversary emulation, TIBER-EU",
|
|
682
|
+
"triggers": [
|
|
683
|
+
"attack surface",
|
|
684
|
+
"pen test",
|
|
685
|
+
"penetration testing",
|
|
686
|
+
"red team",
|
|
687
|
+
"adversary emulation",
|
|
688
|
+
"threat-led testing",
|
|
689
|
+
"tlpt",
|
|
690
|
+
"tiber-eu",
|
|
691
|
+
"asset inventory",
|
|
692
|
+
"external footprint",
|
|
693
|
+
"asm"
|
|
694
|
+
],
|
|
695
|
+
"data_deps": [
|
|
696
|
+
"cve-catalog.json",
|
|
697
|
+
"atlas-ttps.json",
|
|
698
|
+
"framework-control-gaps.json",
|
|
699
|
+
"cwe-catalog.json",
|
|
700
|
+
"d3fend-catalog.json"
|
|
701
|
+
],
|
|
702
|
+
"atlas_refs": [
|
|
703
|
+
"AML.T0043",
|
|
704
|
+
"AML.T0051",
|
|
705
|
+
"AML.T0010"
|
|
706
|
+
],
|
|
707
|
+
"attack_refs": [
|
|
708
|
+
"T1190",
|
|
709
|
+
"T1133",
|
|
710
|
+
"T1059",
|
|
711
|
+
"T1078"
|
|
712
|
+
],
|
|
713
|
+
"framework_gaps": [
|
|
714
|
+
"NIST-800-115",
|
|
715
|
+
"OWASP-Pen-Testing-Guide-v5",
|
|
716
|
+
"PTES-Pre-engagement",
|
|
717
|
+
"NIS2-Art21-patch-management"
|
|
718
|
+
],
|
|
719
|
+
"rfc_refs": [],
|
|
720
|
+
"cwe_refs": [
|
|
721
|
+
"CWE-1395",
|
|
722
|
+
"CWE-22",
|
|
723
|
+
"CWE-269",
|
|
724
|
+
"CWE-352",
|
|
725
|
+
"CWE-434",
|
|
726
|
+
"CWE-732",
|
|
727
|
+
"CWE-78",
|
|
728
|
+
"CWE-787",
|
|
729
|
+
"CWE-79",
|
|
730
|
+
"CWE-89",
|
|
731
|
+
"CWE-918"
|
|
732
|
+
],
|
|
733
|
+
"d3fend_refs": [
|
|
734
|
+
"D3-CSPP",
|
|
735
|
+
"D3-EAL",
|
|
736
|
+
"D3-NTA"
|
|
737
|
+
],
|
|
738
|
+
"last_threat_review": "2026-05-11",
|
|
739
|
+
"forward_watch": [
|
|
740
|
+
"NIST SP 800-115 successor publication (the 2008 original is the active gap)",
|
|
741
|
+
"TIBER-EU scenario library refresh under DORA Year-2 supervisory cycle",
|
|
742
|
+
"OWASP WSTG v5.x AI/MCP test cases (currently in working-group draft)",
|
|
743
|
+
"PTES revision incorporating AI-surface enumeration"
|
|
744
|
+
],
|
|
745
|
+
"signature": "vLhIYT/CC3IzxMRa+UPeqGSZTvthuwUeTMGNFMm37+TaEk0TtfwPrPyrBJLHw4W6Wt7+pufjHs46X3nTgzoRAg==",
|
|
746
|
+
"signed_at": "2026-05-11T23:30:00.505Z"
|
|
747
|
+
},
|
|
748
|
+
{
|
|
749
|
+
"name": "fuzz-testing-strategy",
|
|
750
|
+
"version": "1.0.0",
|
|
751
|
+
"path": "skills/fuzz-testing-strategy/skill.md",
|
|
752
|
+
"description": "Continuous fuzzing as a security control — coverage-guided fuzz (AFL++/libFuzzer), AI-assisted fuzz, OSS-Fuzz integration, kernel fuzz (syzkaller), AI-API fuzz, integration into CI/CD as compliance evidence",
|
|
753
|
+
"triggers": [
|
|
754
|
+
"fuzz testing",
|
|
755
|
+
"fuzzing",
|
|
756
|
+
"oss-fuzz",
|
|
757
|
+
"syzkaller",
|
|
758
|
+
"libfuzzer",
|
|
759
|
+
"afl",
|
|
760
|
+
"coverage-guided fuzz",
|
|
761
|
+
"ai-assisted fuzz",
|
|
762
|
+
"continuous fuzz",
|
|
763
|
+
"prompt fuzz",
|
|
764
|
+
"api fuzz"
|
|
765
|
+
],
|
|
766
|
+
"data_deps": [
|
|
767
|
+
"cve-catalog.json",
|
|
768
|
+
"atlas-ttps.json",
|
|
769
|
+
"framework-control-gaps.json",
|
|
770
|
+
"cwe-catalog.json",
|
|
771
|
+
"d3fend-catalog.json"
|
|
772
|
+
],
|
|
773
|
+
"atlas_refs": [
|
|
774
|
+
"AML.T0043"
|
|
775
|
+
],
|
|
776
|
+
"attack_refs": [
|
|
777
|
+
"T1190"
|
|
778
|
+
],
|
|
779
|
+
"framework_gaps": [
|
|
780
|
+
"NIST-800-218-SSDF",
|
|
781
|
+
"NIST-800-115",
|
|
782
|
+
"OWASP-ASVS-v5.0-V14"
|
|
783
|
+
],
|
|
784
|
+
"rfc_refs": [],
|
|
785
|
+
"cwe_refs": [
|
|
786
|
+
"CWE-125",
|
|
787
|
+
"CWE-20",
|
|
788
|
+
"CWE-362",
|
|
789
|
+
"CWE-416",
|
|
790
|
+
"CWE-78",
|
|
791
|
+
"CWE-787"
|
|
792
|
+
],
|
|
793
|
+
"d3fend_refs": [
|
|
794
|
+
"D3-EAL",
|
|
795
|
+
"D3-IOPR",
|
|
796
|
+
"D3-PSEP"
|
|
797
|
+
],
|
|
798
|
+
"last_threat_review": "2026-05-11",
|
|
799
|
+
"forward_watch": [
|
|
800
|
+
"NIST SP 800-218A (AI-specific SSDF practices) for any explicit fuzz requirement on model-serving stacks",
|
|
801
|
+
"OpenSSF Scorecard \"fuzzing\" check threshold evolution",
|
|
802
|
+
"syzkaller eBPF and io_uring surface expansion as new kernel attack surfaces ship",
|
|
803
|
+
"OSS-Fuzz-Gen / AI-assisted harness generation becoming the default expectation for OSS maintainers"
|
|
804
|
+
],
|
|
805
|
+
"signature": "TOcQLy/427cuf0Lw90J7A0oIeuhUmf9NXb6tOUS5K3SazCKTJujPgYSVAPZOYf1zZrRAY/aq0iqELd5cLyk5DA==",
|
|
806
|
+
"signed_at": "2026-05-11T23:30:00.506Z"
|
|
807
|
+
},
|
|
808
|
+
{
|
|
809
|
+
"name": "dlp-gap-analysis",
|
|
810
|
+
"version": "1.0.0",
|
|
811
|
+
"path": "skills/dlp-gap-analysis/skill.md",
|
|
812
|
+
"description": "DLP gap analysis for mid-2026 — legacy DLP misses LLM prompts, MCP tool args, RAG retrievals, embedding-store exfil, and code-completion telemetry. Audit channels, classifiers, protected surfaces, enforcement actions, and evidence trails against modern threat reality and cross-jurisdictional privacy regimes",
|
|
813
|
+
"triggers": [
|
|
814
|
+
"dlp",
|
|
815
|
+
"data loss prevention",
|
|
816
|
+
"data leak",
|
|
817
|
+
"egress",
|
|
818
|
+
"exfiltration",
|
|
819
|
+
"data classification",
|
|
820
|
+
"llm dlp",
|
|
821
|
+
"prompt dlp",
|
|
822
|
+
"rag exfil",
|
|
823
|
+
"copilot data leak",
|
|
824
|
+
"data exfiltration",
|
|
825
|
+
"mcp tool arg dlp",
|
|
826
|
+
"embedding store exfil",
|
|
827
|
+
"clipboard ai paste"
|
|
828
|
+
],
|
|
829
|
+
"data_deps": [
|
|
830
|
+
"dlp-controls.json",
|
|
831
|
+
"cve-catalog.json",
|
|
832
|
+
"atlas-ttps.json",
|
|
833
|
+
"framework-control-gaps.json",
|
|
834
|
+
"global-frameworks.json",
|
|
835
|
+
"cwe-catalog.json",
|
|
836
|
+
"d3fend-catalog.json"
|
|
837
|
+
],
|
|
838
|
+
"atlas_refs": [
|
|
839
|
+
"AML.T0096",
|
|
840
|
+
"AML.T0017",
|
|
841
|
+
"AML.T0051"
|
|
842
|
+
],
|
|
843
|
+
"attack_refs": [
|
|
844
|
+
"T1567",
|
|
845
|
+
"T1530",
|
|
846
|
+
"T1213",
|
|
847
|
+
"T1041"
|
|
848
|
+
],
|
|
849
|
+
"framework_gaps": [
|
|
850
|
+
"NIST-800-53-SC-7",
|
|
851
|
+
"ISO-27001-2022-A.8.16",
|
|
852
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
853
|
+
"HIPAA-Security-Rule-164.312(a)(1)",
|
|
854
|
+
"SOC2-CC7-anomaly-detection",
|
|
855
|
+
"NIST-800-53-SC-28"
|
|
856
|
+
],
|
|
857
|
+
"rfc_refs": [
|
|
858
|
+
"RFC-8446",
|
|
859
|
+
"RFC-9458"
|
|
860
|
+
],
|
|
861
|
+
"cwe_refs": [
|
|
862
|
+
"CWE-1426",
|
|
863
|
+
"CWE-200"
|
|
864
|
+
],
|
|
865
|
+
"d3fend_refs": [
|
|
866
|
+
"D3-CSPP",
|
|
867
|
+
"D3-EAL",
|
|
868
|
+
"D3-IOPR",
|
|
869
|
+
"D3-NTA",
|
|
870
|
+
"D3-NTPM"
|
|
871
|
+
],
|
|
872
|
+
"last_threat_review": "2026-05-11",
|
|
873
|
+
"forward_watch": [
|
|
874
|
+
"EU AI Office secondary legislation under EU AI Act Art 10 / Art 15 that may operationalise inference-time data-flow controls",
|
|
875
|
+
"ISO/IEC 42001 amendments expected 2026-2027 likely to add prescriptive data-flow guidance for AI systems",
|
|
876
|
+
"Microsoft Purview AI Hub, Nightfall, Netskope GenAI, Cloudflare AI Gateway feature deltas — SDK-level prompt capture coverage is the differentiator",
|
|
877
|
+
"MCP gateway / proxy standardisation (Anthropic enterprise MCP gateway, Portkey MCP) — tool-call argument inspection is the missing primary control",
|
|
878
|
+
"Quebec Law 25, India DPDPA, KSA PDPL enforcement actions naming AI-tool prompt data as in-scope personal information"
|
|
879
|
+
],
|
|
880
|
+
"signature": "u4IN7escQa5V+OgdtaJXLdvhmNiGZsdmGOvebTLZ30WoImT+WiksvaqSa0POGdbr6HzFkALe2RrZEH9Tr0U6Dg==",
|
|
881
|
+
"signed_at": "2026-05-11T23:30:00.506Z"
|
|
882
|
+
},
|
|
883
|
+
{
|
|
884
|
+
"name": "supply-chain-integrity",
|
|
885
|
+
"version": "1.0.0",
|
|
886
|
+
"path": "skills/supply-chain-integrity/skill.md",
|
|
887
|
+
"description": "Supply-chain integrity for mid-2026 — SLSA L3+, in-toto attestations, Sigstore signing, SBOM (CycloneDX/SPDX), VEX via CSAF 2.0, AI-generated code provenance, model weights as supply-chain artifacts",
|
|
888
|
+
"triggers": [
|
|
889
|
+
"supply chain",
|
|
890
|
+
"slsa",
|
|
891
|
+
"sbom",
|
|
892
|
+
"vex",
|
|
893
|
+
"sigstore",
|
|
894
|
+
"cosign",
|
|
895
|
+
"in-toto",
|
|
896
|
+
"cyclonedx",
|
|
897
|
+
"spdx",
|
|
898
|
+
"software composition",
|
|
899
|
+
"model provenance",
|
|
900
|
+
"ai bom",
|
|
901
|
+
"aibom",
|
|
902
|
+
"csaf"
|
|
903
|
+
],
|
|
904
|
+
"data_deps": [
|
|
905
|
+
"cve-catalog.json",
|
|
906
|
+
"atlas-ttps.json",
|
|
907
|
+
"framework-control-gaps.json",
|
|
908
|
+
"rfc-references.json",
|
|
909
|
+
"cwe-catalog.json",
|
|
910
|
+
"d3fend-catalog.json"
|
|
911
|
+
],
|
|
912
|
+
"atlas_refs": [
|
|
913
|
+
"AML.T0010",
|
|
914
|
+
"AML.T0018"
|
|
915
|
+
],
|
|
916
|
+
"attack_refs": [
|
|
917
|
+
"T1195.001",
|
|
918
|
+
"T1195.002",
|
|
919
|
+
"T1554"
|
|
920
|
+
],
|
|
921
|
+
"framework_gaps": [
|
|
922
|
+
"NIST-800-218-SSDF",
|
|
923
|
+
"SLSA-v1.0-Build-L3",
|
|
924
|
+
"VEX-CSAF-v2.1",
|
|
925
|
+
"CycloneDX-v1.6-SBOM",
|
|
926
|
+
"SPDX-v3.0-SBOM",
|
|
927
|
+
"NIST-800-53-SA-12",
|
|
928
|
+
"HITRUST-CSF-v11.4-09.l",
|
|
929
|
+
"SWIFT-CSCF-v2026-1.1",
|
|
930
|
+
"FedRAMP-Rev5-Moderate",
|
|
931
|
+
"CMMC-2.0-Level-2"
|
|
932
|
+
],
|
|
933
|
+
"rfc_refs": [
|
|
934
|
+
"RFC-8032"
|
|
935
|
+
],
|
|
936
|
+
"cwe_refs": [
|
|
937
|
+
"CWE-1357",
|
|
938
|
+
"CWE-1395",
|
|
939
|
+
"CWE-494",
|
|
940
|
+
"CWE-502",
|
|
941
|
+
"CWE-829"
|
|
942
|
+
],
|
|
943
|
+
"d3fend_refs": [
|
|
944
|
+
"D3-CBAN",
|
|
945
|
+
"D3-EAL",
|
|
946
|
+
"D3-EHB"
|
|
947
|
+
],
|
|
948
|
+
"last_threat_review": "2026-05-11",
|
|
949
|
+
"forward_watch": [
|
|
950
|
+
"SLSA v1.1 (draft) — adds attestation chain requirements above L3 and a hardened-builder profile; track for re-baselining",
|
|
951
|
+
"CSAF 2.1 finalization — VEX status vocabulary expansion and machine-readable advisory pivoting",
|
|
952
|
+
"CycloneDX 1.7 — ML-BOM enrichment, model card embedding, training-data lineage fields",
|
|
953
|
+
"SPDX 3.1 — AI profile maturation, dataset provenance schema stabilization",
|
|
954
|
+
"EU CRA (Regulation 2024/2847) — implementing acts for technical documentation and SBOM submission expected through 2027",
|
|
955
|
+
"OpenSSF model-signing — emerging Sigstore-based signing standard for ML model weights; track for production adoption"
|
|
956
|
+
],
|
|
957
|
+
"signature": "eTGQJ3gnG24WggfwuFNNIFOWV/ttPxTa3pvx9OH28m5KDS1a4ZmOR7K8y01wk/su8bH0ClYYRfoBfKQOtRswAg==",
|
|
958
|
+
"signed_at": "2026-05-11T23:30:00.506Z"
|
|
959
|
+
},
|
|
960
|
+
{
|
|
961
|
+
"name": "defensive-countermeasure-mapping",
|
|
962
|
+
"version": "1.0.0",
|
|
963
|
+
"path": "skills/defensive-countermeasure-mapping/skill.md",
|
|
964
|
+
"description": "Map offensive findings (CVE / TTP / framework gap) to MITRE D3FEND defensive countermeasures with explicit defense-in-depth, least-privilege, and zero-trust layering",
|
|
965
|
+
"triggers": [
|
|
966
|
+
"defensive mapping",
|
|
967
|
+
"d3fend",
|
|
968
|
+
"countermeasure",
|
|
969
|
+
"blue team",
|
|
970
|
+
"defense in depth",
|
|
971
|
+
"least privilege",
|
|
972
|
+
"zero trust",
|
|
973
|
+
"control mapping",
|
|
974
|
+
"mitigation",
|
|
975
|
+
"defensive coverage",
|
|
976
|
+
"blue team map"
|
|
977
|
+
],
|
|
978
|
+
"data_deps": [
|
|
979
|
+
"d3fend-catalog.json",
|
|
980
|
+
"atlas-ttps.json",
|
|
981
|
+
"cve-catalog.json",
|
|
982
|
+
"framework-control-gaps.json",
|
|
983
|
+
"cwe-catalog.json",
|
|
984
|
+
"dlp-controls.json"
|
|
985
|
+
],
|
|
986
|
+
"atlas_refs": [],
|
|
987
|
+
"attack_refs": [],
|
|
988
|
+
"framework_gaps": [],
|
|
989
|
+
"rfc_refs": [],
|
|
990
|
+
"cwe_refs": [],
|
|
991
|
+
"d3fend_refs": [
|
|
992
|
+
"D3-ASLR",
|
|
993
|
+
"D3-CA",
|
|
994
|
+
"D3-CBAN",
|
|
995
|
+
"D3-CSPP",
|
|
996
|
+
"D3-DA",
|
|
997
|
+
"D3-EAL",
|
|
998
|
+
"D3-EHB",
|
|
999
|
+
"D3-FAPA",
|
|
1000
|
+
"D3-FE",
|
|
1001
|
+
"D3-IOPR",
|
|
1002
|
+
"D3-MENCR",
|
|
1003
|
+
"D3-MFA",
|
|
1004
|
+
"D3-NI",
|
|
1005
|
+
"D3-NTA",
|
|
1006
|
+
"D3-NTPM",
|
|
1007
|
+
"D3-PA",
|
|
1008
|
+
"D3-PHRA",
|
|
1009
|
+
"D3-PSEP",
|
|
1010
|
+
"D3-RPA",
|
|
1011
|
+
"D3-SCP"
|
|
1012
|
+
],
|
|
1013
|
+
"last_threat_review": "2026-05-11",
|
|
1014
|
+
"signature": "q7gFLPoqf/8bqATR6gt/nj0EoyUOlfzi+bZ0bT3pC9KW7O6M/ji9fT+AXSGNp6PKd+70ACb3mkMGmWgjLpQXCg==",
|
|
1015
|
+
"signed_at": "2026-05-11T23:30:00.506Z"
|
|
1016
|
+
},
|
|
1017
|
+
{
|
|
1018
|
+
"name": "identity-assurance",
|
|
1019
|
+
"version": "1.0.0",
|
|
1020
|
+
"path": "skills/identity-assurance/skill.md",
|
|
1021
|
+
"description": "Identity assurance for mid-2026 — NIST 800-63 AAL/IAL/FAL, FIDO2/WebAuthn passkeys, OIDC/SAML/SCIM, agent-as-principal identity, short-lived workload tokens, OAuth 2.0 + RFC 9700 BCP",
|
|
1022
|
+
"triggers": [
|
|
1023
|
+
"identity assurance",
|
|
1024
|
+
"aal",
|
|
1025
|
+
"ial",
|
|
1026
|
+
"fal",
|
|
1027
|
+
"nist 800-63",
|
|
1028
|
+
"fido2",
|
|
1029
|
+
"webauthn",
|
|
1030
|
+
"passkey",
|
|
1031
|
+
"oidc",
|
|
1032
|
+
"saml",
|
|
1033
|
+
"scim",
|
|
1034
|
+
"agent identity",
|
|
1035
|
+
"workload identity",
|
|
1036
|
+
"service account",
|
|
1037
|
+
"federation",
|
|
1038
|
+
"phishing-resistant"
|
|
1039
|
+
],
|
|
1040
|
+
"data_deps": [
|
|
1041
|
+
"cve-catalog.json",
|
|
1042
|
+
"atlas-ttps.json",
|
|
1043
|
+
"framework-control-gaps.json",
|
|
1044
|
+
"cwe-catalog.json",
|
|
1045
|
+
"d3fend-catalog.json",
|
|
1046
|
+
"rfc-references.json"
|
|
1047
|
+
],
|
|
1048
|
+
"atlas_refs": [
|
|
1049
|
+
"AML.T0051"
|
|
1050
|
+
],
|
|
1051
|
+
"attack_refs": [
|
|
1052
|
+
"T1078",
|
|
1053
|
+
"T1556",
|
|
1054
|
+
"T1110"
|
|
1055
|
+
],
|
|
1056
|
+
"framework_gaps": [
|
|
1057
|
+
"NIST-800-63B-rev4",
|
|
1058
|
+
"NIST-800-53-AC-2",
|
|
1059
|
+
"ISO-27001-2022-A.8.30",
|
|
1060
|
+
"SOC2-CC6-logical-access",
|
|
1061
|
+
"PSD2-RTS-SCA"
|
|
1062
|
+
],
|
|
1063
|
+
"rfc_refs": [
|
|
1064
|
+
"RFC-7519",
|
|
1065
|
+
"RFC-8725",
|
|
1066
|
+
"RFC-6749",
|
|
1067
|
+
"RFC-9700",
|
|
1068
|
+
"RFC-8032"
|
|
1069
|
+
],
|
|
1070
|
+
"cwe_refs": [
|
|
1071
|
+
"CWE-269",
|
|
1072
|
+
"CWE-287",
|
|
1073
|
+
"CWE-306",
|
|
1074
|
+
"CWE-732",
|
|
1075
|
+
"CWE-798",
|
|
1076
|
+
"CWE-862",
|
|
1077
|
+
"CWE-863"
|
|
1078
|
+
],
|
|
1079
|
+
"d3fend_refs": [],
|
|
1080
|
+
"last_threat_review": "2026-05-11",
|
|
1081
|
+
"signature": "pX8rhrrzuyG3iRrPORLqTZAjzGdWK/bKPUGJG5WHSZcv4LB0kQXOit4sHG0exdXxI6HY8jyX67QY4r5vEHHACw==",
|
|
1082
|
+
"signed_at": "2026-05-11T23:30:00.507Z"
|
|
1083
|
+
},
|
|
1084
|
+
{
|
|
1085
|
+
"name": "ot-ics-security",
|
|
1086
|
+
"version": "1.0.0",
|
|
1087
|
+
"path": "skills/ot-ics-security/skill.md",
|
|
1088
|
+
"description": "OT / ICS security for mid-2026 — NIST 800-82r3, IEC 62443-3-3, NERC CIP, IT/OT convergence risks, AI-augmented HMI threats, ICS-specific TTPs (ATT&CK for ICS)",
|
|
1089
|
+
"triggers": [
|
|
1090
|
+
"ot security",
|
|
1091
|
+
"ics security",
|
|
1092
|
+
"scada",
|
|
1093
|
+
"plc security",
|
|
1094
|
+
"operational technology",
|
|
1095
|
+
"industrial control",
|
|
1096
|
+
"iec 62443",
|
|
1097
|
+
"nist 800-82",
|
|
1098
|
+
"nerc cip",
|
|
1099
|
+
"it ot convergence",
|
|
1100
|
+
"hmi security",
|
|
1101
|
+
"air gap",
|
|
1102
|
+
"level 0",
|
|
1103
|
+
"level 1",
|
|
1104
|
+
"purdue"
|
|
1105
|
+
],
|
|
1106
|
+
"data_deps": [
|
|
1107
|
+
"cve-catalog.json",
|
|
1108
|
+
"atlas-ttps.json",
|
|
1109
|
+
"framework-control-gaps.json",
|
|
1110
|
+
"cwe-catalog.json",
|
|
1111
|
+
"d3fend-catalog.json"
|
|
1112
|
+
],
|
|
1113
|
+
"atlas_refs": [
|
|
1114
|
+
"AML.T0010"
|
|
1115
|
+
],
|
|
1116
|
+
"attack_refs": [
|
|
1117
|
+
"T0855",
|
|
1118
|
+
"T0883",
|
|
1119
|
+
"T1190",
|
|
1120
|
+
"T1068"
|
|
1121
|
+
],
|
|
1122
|
+
"framework_gaps": [
|
|
1123
|
+
"NIST-800-82r3",
|
|
1124
|
+
"IEC-62443-3-3",
|
|
1125
|
+
"NERC-CIP-007-6-R4",
|
|
1126
|
+
"NIS2-Art21-patch-management"
|
|
1127
|
+
],
|
|
1128
|
+
"rfc_refs": [],
|
|
1129
|
+
"cwe_refs": [
|
|
1130
|
+
"CWE-287",
|
|
1131
|
+
"CWE-798",
|
|
1132
|
+
"CWE-306",
|
|
1133
|
+
"CWE-1037"
|
|
1134
|
+
],
|
|
1135
|
+
"d3fend_refs": [],
|
|
1136
|
+
"last_threat_review": "2026-05-11",
|
|
1137
|
+
"signature": "ypb8kNZQRdyu5mWeveB7sjCjNKXS1yXvjDJv88muzwhOs/a4Fu/Gb532js5NKyy+eCw/emrphpTZaL8R9a2lBA==",
|
|
1138
|
+
"signed_at": "2026-05-11T23:30:00.507Z"
|
|
1139
|
+
},
|
|
1140
|
+
{
|
|
1141
|
+
"name": "coordinated-vuln-disclosure",
|
|
1142
|
+
"version": "1.0.0",
|
|
1143
|
+
"path": "skills/coordinated-vuln-disclosure/skill.md",
|
|
1144
|
+
"description": "Coordinated Vulnerability Disclosure for mid-2026 — ISO 29147 (disclosure) + ISO 30111 (handling) + VDP + bug bounty + CSAF 2.0 advisories + security.txt + EU CRA / NIS2 regulator-mandated disclosure + AI vulnerability classes",
|
|
1145
|
+
"triggers": [
|
|
1146
|
+
"cvd",
|
|
1147
|
+
"coordinated vulnerability disclosure",
|
|
1148
|
+
"vdp",
|
|
1149
|
+
"vulnerability disclosure program",
|
|
1150
|
+
"bug bounty",
|
|
1151
|
+
"responsible disclosure",
|
|
1152
|
+
"iso 29147",
|
|
1153
|
+
"iso 30111",
|
|
1154
|
+
"csaf",
|
|
1155
|
+
"security.txt",
|
|
1156
|
+
"90-day disclosure",
|
|
1157
|
+
"project zero"
|
|
1158
|
+
],
|
|
1159
|
+
"data_deps": [
|
|
1160
|
+
"cve-catalog.json",
|
|
1161
|
+
"atlas-ttps.json",
|
|
1162
|
+
"framework-control-gaps.json",
|
|
1163
|
+
"zeroday-lessons.json",
|
|
1164
|
+
"rfc-references.json",
|
|
1165
|
+
"cwe-catalog.json",
|
|
1166
|
+
"d3fend-catalog.json"
|
|
1167
|
+
],
|
|
1168
|
+
"atlas_refs": [],
|
|
1169
|
+
"attack_refs": [],
|
|
1170
|
+
"framework_gaps": [
|
|
1171
|
+
"NIST-800-218-SSDF",
|
|
1172
|
+
"ISO-27001-2022-A.8.8",
|
|
1173
|
+
"SOC2-CC9-vendor-management"
|
|
1174
|
+
],
|
|
1175
|
+
"rfc_refs": [],
|
|
1176
|
+
"cwe_refs": [
|
|
1177
|
+
"CWE-1357"
|
|
1178
|
+
],
|
|
1179
|
+
"d3fend_refs": [],
|
|
1180
|
+
"last_threat_review": "2026-05-11",
|
|
1181
|
+
"forward_watch": [
|
|
1182
|
+
"EU CRA Art. 11 implementing regulations and ENISA single-reporting-platform rollout (target operational 2026-09; first manufacturer notifications due 2027-12 per CRA transition timeline)",
|
|
1183
|
+
"ISO/IEC 29147 and ISO/IEC 30111 revisions expected post-CRA to align \"method-neutral\" language with EU 24h-notification reality",
|
|
1184
|
+
"CSAF 2.1 draft (CISA + OASIS working group) — VEX status profile extensions for AI/ML components and SBOM-aligned advisory shape",
|
|
1185
|
+
"Forthcoming IETF work on AI vulnerability disclosure (proposed BoF under SECDISPATCH) and any update to RFC 9116 (security.txt) covering AI/model artifact disclosure endpoints",
|
|
1186
|
+
"UK NCSC Vulnerability Disclosure Toolkit revisions and AU ISM CVD guidance updates",
|
|
1187
|
+
"NYDFS 23 NYCRR 500 amendments potentially adding explicit CVD program requirements"
|
|
1188
|
+
],
|
|
1189
|
+
"signature": "346Lt+277ycRNsyAOGwLSONi4awgxKy3hP9G+BWjwaa8ySmTeqbYsbyyhtxjeohk9bV2SF+Hl2q4JdSvc/2qCQ==",
|
|
1190
|
+
"signed_at": "2026-05-11T23:30:00.507Z"
|
|
1191
|
+
},
|
|
1192
|
+
{
|
|
1193
|
+
"name": "threat-modeling-methodology",
|
|
1194
|
+
"version": "1.0.0",
|
|
1195
|
+
"path": "skills/threat-modeling-methodology/skill.md",
|
|
1196
|
+
"description": "Threat modeling methodologies for mid-2026 — STRIDE, PASTA, LINDDUN (privacy), Cyber Kill Chain, Diamond Model, MITRE Unified Kill Chain, AI-system threat modeling, agent-based threat modeling",
|
|
1197
|
+
"triggers": [
|
|
1198
|
+
"threat model",
|
|
1199
|
+
"threat modeling",
|
|
1200
|
+
"stride",
|
|
1201
|
+
"pasta",
|
|
1202
|
+
"linddun",
|
|
1203
|
+
"kill chain",
|
|
1204
|
+
"diamond model",
|
|
1205
|
+
"unified kill chain",
|
|
1206
|
+
"attack tree",
|
|
1207
|
+
"threat modeling methodology",
|
|
1208
|
+
"data flow diagram",
|
|
1209
|
+
"dfd",
|
|
1210
|
+
"trust boundary"
|
|
1211
|
+
],
|
|
1212
|
+
"data_deps": [
|
|
1213
|
+
"atlas-ttps.json",
|
|
1214
|
+
"framework-control-gaps.json",
|
|
1215
|
+
"cve-catalog.json",
|
|
1216
|
+
"cwe-catalog.json",
|
|
1217
|
+
"d3fend-catalog.json"
|
|
1218
|
+
],
|
|
1219
|
+
"atlas_refs": [],
|
|
1220
|
+
"attack_refs": [],
|
|
1221
|
+
"framework_gaps": [
|
|
1222
|
+
"ISO-27001-2022-A.8.28",
|
|
1223
|
+
"ISO-IEC-23894-2023-clause-7",
|
|
1224
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
1225
|
+
"NIST-800-218-SSDF"
|
|
1226
|
+
],
|
|
1227
|
+
"rfc_refs": [],
|
|
1228
|
+
"cwe_refs": [],
|
|
1229
|
+
"d3fend_refs": [],
|
|
1230
|
+
"last_threat_review": "2026-05-11",
|
|
1231
|
+
"forward_watch": [
|
|
1232
|
+
"ISO/IEC 27005 revision integrating AI-system threats",
|
|
1233
|
+
"OWASP Threat Modeling Manifesto v2 (post-2020)",
|
|
1234
|
+
"MITRE ATLAS v6 publication and any methodology guidance attached",
|
|
1235
|
+
"Unified Kill Chain successor revision (Pols, post-v3.0)",
|
|
1236
|
+
"LINDDUN-GO and LINDDUN-PRO updates incorporating LLM privacy threats",
|
|
1237
|
+
"PASTA v2 updates incorporating AI/ML application threats"
|
|
1238
|
+
],
|
|
1239
|
+
"signature": "ewTvG5vu3ngFHyXgBur5vSKDFQsOZx0x79djGMricl7LCvQf5//OG6LZKXa+AOuEq58prRS+HgzrFA1DiTfeCQ==",
|
|
1240
|
+
"signed_at": "2026-05-11T23:30:00.508Z"
|
|
1241
|
+
},
|
|
1242
|
+
{
|
|
1243
|
+
"name": "webapp-security",
|
|
1244
|
+
"version": "1.0.0",
|
|
1245
|
+
"path": "skills/webapp-security/skill.md",
|
|
1246
|
+
"description": "Web application security for mid-2026 — OWASP Top 10 2025, OWASP ASVS v5, CWE root-cause coverage, AI-generated code weakness drift, server-rendered vs SPA tradeoffs, defense-in-depth across the request lifecycle",
|
|
1247
|
+
"triggers": [
|
|
1248
|
+
"webapp security",
|
|
1249
|
+
"web application security",
|
|
1250
|
+
"owasp top 10",
|
|
1251
|
+
"owasp asvs",
|
|
1252
|
+
"xss",
|
|
1253
|
+
"csrf",
|
|
1254
|
+
"sqli",
|
|
1255
|
+
"sql injection",
|
|
1256
|
+
"path traversal",
|
|
1257
|
+
"ssrf",
|
|
1258
|
+
"file upload",
|
|
1259
|
+
"command injection",
|
|
1260
|
+
"unsafe deserialization",
|
|
1261
|
+
"broken access control",
|
|
1262
|
+
"ai generated code"
|
|
1263
|
+
],
|
|
1264
|
+
"data_deps": [
|
|
1265
|
+
"cve-catalog.json",
|
|
1266
|
+
"atlas-ttps.json",
|
|
1267
|
+
"framework-control-gaps.json",
|
|
1268
|
+
"cwe-catalog.json",
|
|
1269
|
+
"d3fend-catalog.json",
|
|
1270
|
+
"rfc-references.json"
|
|
1271
|
+
],
|
|
1272
|
+
"atlas_refs": [
|
|
1273
|
+
"AML.T0051"
|
|
1274
|
+
],
|
|
1275
|
+
"attack_refs": [
|
|
1276
|
+
"T1190",
|
|
1277
|
+
"T1059",
|
|
1278
|
+
"T1505"
|
|
1279
|
+
],
|
|
1280
|
+
"framework_gaps": [
|
|
1281
|
+
"OWASP-ASVS-v5.0-V14",
|
|
1282
|
+
"OWASP-LLM-Top-10-2025-LLM01",
|
|
1283
|
+
"NIST-800-218-SSDF",
|
|
1284
|
+
"ISO-27001-2022-A.8.28"
|
|
1285
|
+
],
|
|
1286
|
+
"rfc_refs": [
|
|
1287
|
+
"RFC-8446",
|
|
1288
|
+
"RFC-9114",
|
|
1289
|
+
"RFC-7519",
|
|
1290
|
+
"RFC-8725"
|
|
1291
|
+
],
|
|
1292
|
+
"cwe_refs": [
|
|
1293
|
+
"CWE-22",
|
|
1294
|
+
"CWE-77",
|
|
1295
|
+
"CWE-78",
|
|
1296
|
+
"CWE-79",
|
|
1297
|
+
"CWE-89",
|
|
1298
|
+
"CWE-94",
|
|
1299
|
+
"CWE-200",
|
|
1300
|
+
"CWE-269",
|
|
1301
|
+
"CWE-287",
|
|
1302
|
+
"CWE-352",
|
|
1303
|
+
"CWE-434",
|
|
1304
|
+
"CWE-502",
|
|
1305
|
+
"CWE-732",
|
|
1306
|
+
"CWE-862",
|
|
1307
|
+
"CWE-863",
|
|
1308
|
+
"CWE-918",
|
|
1309
|
+
"CWE-1188"
|
|
1310
|
+
],
|
|
1311
|
+
"d3fend_refs": [],
|
|
1312
|
+
"last_threat_review": "2026-05-11",
|
|
1313
|
+
"signature": "ZHjbKu0Em92Kimr2esL1g93mf9TmcsChBhVEMWf/lFrjeLcg8nyHEIcDstIZ3FWYgc6MQNHnc3Rup3Xp/Za1Cw==",
|
|
1314
|
+
"signed_at": "2026-05-11T23:30:00.508Z"
|
|
1315
|
+
},
|
|
1316
|
+
{
|
|
1317
|
+
"name": "ai-risk-management",
|
|
1318
|
+
"version": "1.0.0",
|
|
1319
|
+
"path": "skills/ai-risk-management/skill.md",
|
|
1320
|
+
"description": "AI governance and risk management for mid-2026 — ISO/IEC 23894 risk process, ISO/IEC 42001 management system, NIST AI RMF, EU AI Act high-risk obligations, AI impact assessments, AI red-team programs, AI incident lifecycle",
|
|
1321
|
+
"triggers": [
|
|
1322
|
+
"ai risk management",
|
|
1323
|
+
"ai governance",
|
|
1324
|
+
"ai impact assessment",
|
|
1325
|
+
"aia",
|
|
1326
|
+
"dpia ai",
|
|
1327
|
+
"iso 23894",
|
|
1328
|
+
"iso 42001",
|
|
1329
|
+
"nist ai rmf",
|
|
1330
|
+
"ai red team program",
|
|
1331
|
+
"ai incident response",
|
|
1332
|
+
"eu ai act high-risk",
|
|
1333
|
+
"ai vendor risk",
|
|
1334
|
+
"ai management system"
|
|
1335
|
+
],
|
|
1336
|
+
"data_deps": [
|
|
1337
|
+
"atlas-ttps.json",
|
|
1338
|
+
"framework-control-gaps.json",
|
|
1339
|
+
"global-frameworks.json",
|
|
1340
|
+
"cwe-catalog.json",
|
|
1341
|
+
"d3fend-catalog.json",
|
|
1342
|
+
"zeroday-lessons.json"
|
|
1343
|
+
],
|
|
1344
|
+
"atlas_refs": [
|
|
1345
|
+
"AML.T0051",
|
|
1346
|
+
"AML.T0096",
|
|
1347
|
+
"AML.T0017"
|
|
1348
|
+
],
|
|
1349
|
+
"attack_refs": [],
|
|
1350
|
+
"framework_gaps": [
|
|
1351
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
1352
|
+
"ISO-IEC-23894-2023-clause-7",
|
|
1353
|
+
"NIST-AI-RMF-MEASURE-2.5",
|
|
1354
|
+
"OWASP-LLM-Top-10-2025-LLM01"
|
|
1355
|
+
],
|
|
1356
|
+
"rfc_refs": [],
|
|
1357
|
+
"cwe_refs": [
|
|
1358
|
+
"CWE-1426",
|
|
1359
|
+
"CWE-1039"
|
|
1360
|
+
],
|
|
1361
|
+
"d3fend_refs": [],
|
|
1362
|
+
"last_threat_review": "2026-05-11",
|
|
1363
|
+
"signature": "1KRxjCbAX0Rs5NTOioi1w/f1SOzDQrtRoXjTDtzEwJ+d1QzFf9cqmBlp0uXmGpL0bzEaHWIctjigSychmoL2Dw==",
|
|
1364
|
+
"signed_at": "2026-05-11T23:30:00.508Z"
|
|
1365
|
+
},
|
|
1366
|
+
{
|
|
1367
|
+
"name": "sector-healthcare",
|
|
1368
|
+
"version": "1.0.0",
|
|
1369
|
+
"path": "skills/sector-healthcare/skill.md",
|
|
1370
|
+
"description": "Healthcare sector cybersecurity for mid-2026 — HIPAA + HITRUST + HL7 FHIR security, medical device cyber (FDA + EU MDR), AI-in-healthcare under EU AI Act + FDA AI/ML SaMD guidance, patient data flows through LLM clinical tools",
|
|
1371
|
+
"triggers": [
|
|
1372
|
+
"healthcare security",
|
|
1373
|
+
"hipaa",
|
|
1374
|
+
"hitrust",
|
|
1375
|
+
"hl7",
|
|
1376
|
+
"fhir",
|
|
1377
|
+
"phi",
|
|
1378
|
+
"protected health information",
|
|
1379
|
+
"medical device security",
|
|
1380
|
+
"samd",
|
|
1381
|
+
"fda cyber",
|
|
1382
|
+
"eu mdr",
|
|
1383
|
+
"clinical decision support",
|
|
1384
|
+
"ai diagnostic",
|
|
1385
|
+
"patient data"
|
|
1386
|
+
],
|
|
1387
|
+
"data_deps": [
|
|
1388
|
+
"cve-catalog.json",
|
|
1389
|
+
"atlas-ttps.json",
|
|
1390
|
+
"framework-control-gaps.json",
|
|
1391
|
+
"global-frameworks.json",
|
|
1392
|
+
"cwe-catalog.json",
|
|
1393
|
+
"d3fend-catalog.json",
|
|
1394
|
+
"dlp-controls.json"
|
|
1395
|
+
],
|
|
1396
|
+
"atlas_refs": [
|
|
1397
|
+
"AML.T0051",
|
|
1398
|
+
"AML.T0017"
|
|
1399
|
+
],
|
|
1400
|
+
"attack_refs": [
|
|
1401
|
+
"T1078",
|
|
1402
|
+
"T1530",
|
|
1403
|
+
"T1567"
|
|
1404
|
+
],
|
|
1405
|
+
"framework_gaps": [
|
|
1406
|
+
"HIPAA-Security-Rule-164.312(a)(1)",
|
|
1407
|
+
"HITRUST-CSF-v11.4-09.l",
|
|
1408
|
+
"ISO-27001-2022-A.8.30",
|
|
1409
|
+
"NIST-800-53-AC-2"
|
|
1410
|
+
],
|
|
1411
|
+
"rfc_refs": [
|
|
1412
|
+
"RFC-7519",
|
|
1413
|
+
"RFC-9421"
|
|
1414
|
+
],
|
|
1415
|
+
"cwe_refs": [
|
|
1416
|
+
"CWE-200",
|
|
1417
|
+
"CWE-287",
|
|
1418
|
+
"CWE-862",
|
|
1419
|
+
"CWE-1426"
|
|
1420
|
+
],
|
|
1421
|
+
"d3fend_refs": [],
|
|
1422
|
+
"last_threat_review": "2026-05-11",
|
|
1423
|
+
"signature": "eiajFh7w7d4g+/crGalTtw9Qsu0deVsdHkdthZSy595ifGmgu0zaFD8usKThbPhOdUCCclTYkZYz5GalQmkhCw==",
|
|
1424
|
+
"signed_at": "2026-05-11T23:30:00.509Z"
|
|
1425
|
+
},
|
|
1426
|
+
{
|
|
1427
|
+
"name": "sector-financial",
|
|
1428
|
+
"version": "1.0.0",
|
|
1429
|
+
"path": "skills/sector-financial/skill.md",
|
|
1430
|
+
"description": "Financial services cybersecurity for mid-2026 — EU DORA TLPT, PSD2 RTS-SCA, SWIFT CSCF v2026, NYDFS 23 NYCRR 500, FFIEC CAT, MAS TRM, APRA CPS 234, IL BoI Directive 361, OSFI B-13; Threat-Led Pen Testing schemes TIBER-EU + CBEST + iCAST",
|
|
1431
|
+
"triggers": [
|
|
1432
|
+
"financial security",
|
|
1433
|
+
"banking security",
|
|
1434
|
+
"dora",
|
|
1435
|
+
"psd2",
|
|
1436
|
+
"psd3",
|
|
1437
|
+
"sca",
|
|
1438
|
+
"strong customer authentication",
|
|
1439
|
+
"swift cscf",
|
|
1440
|
+
"nydfs",
|
|
1441
|
+
"23 nycrr 500",
|
|
1442
|
+
"ffiec",
|
|
1443
|
+
"mas trm",
|
|
1444
|
+
"apra cps 234",
|
|
1445
|
+
"tiber-eu",
|
|
1446
|
+
"cbest",
|
|
1447
|
+
"icast",
|
|
1448
|
+
"tlpt"
|
|
1449
|
+
],
|
|
1450
|
+
"data_deps": [
|
|
1451
|
+
"cve-catalog.json",
|
|
1452
|
+
"atlas-ttps.json",
|
|
1453
|
+
"framework-control-gaps.json",
|
|
1454
|
+
"global-frameworks.json",
|
|
1455
|
+
"cwe-catalog.json",
|
|
1456
|
+
"d3fend-catalog.json",
|
|
1457
|
+
"dlp-controls.json"
|
|
1458
|
+
],
|
|
1459
|
+
"atlas_refs": [
|
|
1460
|
+
"AML.T0096",
|
|
1461
|
+
"AML.T0017"
|
|
1462
|
+
],
|
|
1463
|
+
"attack_refs": [
|
|
1464
|
+
"T1078",
|
|
1465
|
+
"T1190",
|
|
1466
|
+
"T1486",
|
|
1467
|
+
"T1567"
|
|
1468
|
+
],
|
|
1469
|
+
"framework_gaps": [
|
|
1470
|
+
"PSD2-RTS-SCA",
|
|
1471
|
+
"SWIFT-CSCF-v2026-1.1",
|
|
1472
|
+
"NIST-800-53-AC-2",
|
|
1473
|
+
"SOC2-CC6-logical-access"
|
|
1474
|
+
],
|
|
1475
|
+
"rfc_refs": [
|
|
1476
|
+
"RFC-8446",
|
|
1477
|
+
"RFC-7519",
|
|
1478
|
+
"RFC-8725",
|
|
1479
|
+
"RFC-9421"
|
|
1480
|
+
],
|
|
1481
|
+
"cwe_refs": [
|
|
1482
|
+
"CWE-287",
|
|
1483
|
+
"CWE-862",
|
|
1484
|
+
"CWE-863",
|
|
1485
|
+
"CWE-798",
|
|
1486
|
+
"CWE-352"
|
|
1487
|
+
],
|
|
1488
|
+
"d3fend_refs": [],
|
|
1489
|
+
"last_threat_review": "2026-05-11",
|
|
1490
|
+
"forward_watch": [
|
|
1491
|
+
"PSD3 + PSR (Payment Services Regulation) trilogue and final adoption (expected 2026-2027); track agent-initiated payment treatment in final text",
|
|
1492
|
+
"DORA Art. 26 TLPT first full cycle completion mid-2027; ESAs publishing aggregate findings under JC 2024/40 RTS",
|
|
1493
|
+
"SWIFT CSCF v2027 (annual update cycle); track AI-mediated message generation controls",
|
|
1494
|
+
"NYDFS 23 NYCRR 500 further amendments; track agentic-AI in CISO certification scope",
|
|
1495
|
+
"FFIEC CAT replacement by CRI Profile v2 (Cyber Risk Institute) — US sector baseline migration",
|
|
1496
|
+
"MAS Notice 655 / TRM Guidelines refresh tracking GenAI in financial services",
|
|
1497
|
+
"HKMA CFI 3.0 cycle and iCAST scope expansion to AI/ML systems",
|
|
1498
|
+
"APRA CPS 230 (Operational Risk Management) effective 2025-07-01 — operational resilience overlay on CPS 234",
|
|
1499
|
+
"UK FCA / PRA operational resilience self-assessment cycle (SS1/21, SS2/21) and impact tolerances refresh post-2025",
|
|
1500
|
+
"BCB Resolução BCB 85 (cyber policy for FIs) and Brazil PIX fraud-typology updates",
|
|
1501
|
+
"OSFI B-13 (Technology and Cyber Risk Management) post-2024 examination findings",
|
|
1502
|
+
"TIBER-EU framework v2.0 alignment with DORA TLPT RTS (JC 2024/40); cross-recognition with CBEST and iCAST"
|
|
1503
|
+
],
|
|
1504
|
+
"signature": "iSZR/fYESQVyjkcqj+O+yzU0BQfaELH5s7WizzUTWvDPDTD2ZyOnZTT1r/Zfx2l4mbPmVeFGWdYnnVFTk/i3Aw==",
|
|
1505
|
+
"signed_at": "2026-05-11T23:30:00.509Z"
|
|
1506
|
+
},
|
|
1507
|
+
{
|
|
1508
|
+
"name": "sector-federal-government",
|
|
1509
|
+
"version": "1.0.0",
|
|
1510
|
+
"path": "skills/sector-federal-government/skill.md",
|
|
1511
|
+
"description": "Federal government + defense contractor cybersecurity for mid-2026 — FedRAMP Rev5, CMMC 2.0, EO 14028, NIST 800-171/172 CUI, FISMA, M-22-09 federal Zero Trust, OMB M-24-04 AI risk, CISA BOD/ED; cross-jurisdiction NCSC UK, ENISA EUCC, AU PSPF, IL government cyber methodology",
|
|
1512
|
+
"triggers": [
|
|
1513
|
+
"federal cyber",
|
|
1514
|
+
"government cybersecurity",
|
|
1515
|
+
"fedramp",
|
|
1516
|
+
"cmmc",
|
|
1517
|
+
"eo 14028",
|
|
1518
|
+
"nist 800-171",
|
|
1519
|
+
"nist 800-172",
|
|
1520
|
+
"cui",
|
|
1521
|
+
"fisma",
|
|
1522
|
+
"federal zero trust",
|
|
1523
|
+
"m-22-09",
|
|
1524
|
+
"omb m-24-04",
|
|
1525
|
+
"jab authorization",
|
|
1526
|
+
"cisa bod",
|
|
1527
|
+
"cisa ed",
|
|
1528
|
+
"stateramp"
|
|
1529
|
+
],
|
|
1530
|
+
"data_deps": [
|
|
1531
|
+
"cve-catalog.json",
|
|
1532
|
+
"atlas-ttps.json",
|
|
1533
|
+
"framework-control-gaps.json",
|
|
1534
|
+
"global-frameworks.json",
|
|
1535
|
+
"cwe-catalog.json",
|
|
1536
|
+
"d3fend-catalog.json"
|
|
1537
|
+
],
|
|
1538
|
+
"atlas_refs": [],
|
|
1539
|
+
"attack_refs": [
|
|
1540
|
+
"T1190",
|
|
1541
|
+
"T1195.001",
|
|
1542
|
+
"T1554"
|
|
1543
|
+
],
|
|
1544
|
+
"framework_gaps": [
|
|
1545
|
+
"FedRAMP-Rev5-Moderate",
|
|
1546
|
+
"CMMC-2.0-Level-2",
|
|
1547
|
+
"NIST-800-218-SSDF",
|
|
1548
|
+
"SLSA-v1.0-Build-L3"
|
|
1549
|
+
],
|
|
1550
|
+
"rfc_refs": [
|
|
1551
|
+
"RFC-8032",
|
|
1552
|
+
"RFC-8446"
|
|
1553
|
+
],
|
|
1554
|
+
"cwe_refs": [
|
|
1555
|
+
"CWE-1357",
|
|
1556
|
+
"CWE-1395",
|
|
1557
|
+
"CWE-829"
|
|
1558
|
+
],
|
|
1559
|
+
"d3fend_refs": [],
|
|
1560
|
+
"last_threat_review": "2026-05-11",
|
|
1561
|
+
"forward_watch": [
|
|
1562
|
+
"CMMC 2.0 phased rollout milestones through 2028 — Phase 1 (self-assessment) effective Dec 2024, Phase 2 (C3PAO assessments) ramping in 2025-2026, Phase 3 (DIBCAC-level assessments) and Phase 4 (full enforcement in all contracts) push into 2028",
|
|
1563
|
+
"NIST SP 800-171 Rev 3 (May 2024) replacing Rev 2 in contracts — three-year transition; track which DoD / civilian agency contracts have crossed the Rev 3 boundary",
|
|
1564
|
+
"NIST SP 800-172 Rev 3 (forthcoming) for the CMMC Level 3 \"enhanced security requirements\" baseline against APT",
|
|
1565
|
+
"OMB M-24-04 federal AI risk-management implementation deadlines through 2025-2026 — agency CAIO appointments, AI use-case inventories, generative AI policies",
|
|
1566
|
+
"FedRAMP 20x program (modernization effort, 2024-2026) — moving toward continuous authorization, machine-readable controls, OSCAL native, automated significant-change review",
|
|
1567
|
+
"CISA Secure by Design and Secure by Default pledges — federal procurement leverage on commercial vendors, expanding through 2026",
|
|
1568
|
+
"Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) final rule from CISA — 72-hour incident / 24-hour ransomware payment reporting, expected effective late 2026 / 2027 for federal contractors in covered CI sectors",
|
|
1569
|
+
"UK GovAssure replacing the legacy IT Health Check (ITHC) scheme — phased rollout for departments and ALBs through 2026",
|
|
1570
|
+
"EU Cybersecurity Certification Scheme on Common Criteria (EUCC) operational — first certificates issued 2024; high-assurance level for government use cases ramping",
|
|
1571
|
+
"Australia PSPF 2024 revision and ISM quarterly updates — track for Essential Eight Maturity Level requirements for federal entities"
|
|
1572
|
+
],
|
|
1573
|
+
"signature": "Wjdo5YXEL8XeNZkaEueG1DOUoyalstNPzQkxD/cwP5iMrJWg/Ly+sC0Oluuqm3aU7d63z55PrbGQCJD0XVZqBg==",
|
|
1574
|
+
"signed_at": "2026-05-11T23:30:00.509Z"
|
|
1575
|
+
},
|
|
1576
|
+
{
|
|
1577
|
+
"name": "sector-energy",
|
|
1578
|
+
"version": "1.0.0",
|
|
1579
|
+
"path": "skills/sector-energy/skill.md",
|
|
1580
|
+
"description": "Electric power + oil & gas + water/wastewater + renewable-integration cybersecurity for mid-2026 — NERC CIP v6/v7, NIST 800-82r3, TSA Pipeline SD-2021-02C, AWWA cyber, EU NIS2 energy + NCCS-G (cross-border electricity), AU AESCSF + SOCI, ENISA energy sector",
|
|
1581
|
+
"triggers": [
|
|
1582
|
+
"energy security",
|
|
1583
|
+
"electric grid security",
|
|
1584
|
+
"oil gas cyber",
|
|
1585
|
+
"pipeline cyber",
|
|
1586
|
+
"water utility cyber",
|
|
1587
|
+
"nerc cip",
|
|
1588
|
+
"tsa sd-2021",
|
|
1589
|
+
"awwa cyber",
|
|
1590
|
+
"aescsf",
|
|
1591
|
+
"nccs-g",
|
|
1592
|
+
"grid resilience",
|
|
1593
|
+
"renewable cyber",
|
|
1594
|
+
"inverter security",
|
|
1595
|
+
"der security",
|
|
1596
|
+
"smart meter security"
|
|
1597
|
+
],
|
|
1598
|
+
"data_deps": [
|
|
1599
|
+
"cve-catalog.json",
|
|
1600
|
+
"atlas-ttps.json",
|
|
1601
|
+
"framework-control-gaps.json",
|
|
1602
|
+
"global-frameworks.json",
|
|
1603
|
+
"cwe-catalog.json",
|
|
1604
|
+
"d3fend-catalog.json"
|
|
1605
|
+
],
|
|
1606
|
+
"atlas_refs": [],
|
|
1607
|
+
"attack_refs": [
|
|
1608
|
+
"T0855",
|
|
1609
|
+
"T0883",
|
|
1610
|
+
"T1190",
|
|
1611
|
+
"T1078"
|
|
1612
|
+
],
|
|
1613
|
+
"framework_gaps": [
|
|
1614
|
+
"NERC-CIP-007-6-R4",
|
|
1615
|
+
"NIST-800-82r3",
|
|
1616
|
+
"IEC-62443-3-3",
|
|
1617
|
+
"NIS2-Art21-patch-management"
|
|
1618
|
+
],
|
|
1619
|
+
"rfc_refs": [],
|
|
1620
|
+
"cwe_refs": [
|
|
1621
|
+
"CWE-287",
|
|
1622
|
+
"CWE-798",
|
|
1623
|
+
"CWE-306",
|
|
1624
|
+
"CWE-1037"
|
|
1625
|
+
],
|
|
1626
|
+
"d3fend_refs": [],
|
|
1627
|
+
"last_threat_review": "2026-05-11",
|
|
1628
|
+
"forward_watch": [
|
|
1629
|
+
"NERC CIP v7 final FERC order (anticipated 2026–2027) — additions for low-impact BES Cyber Systems, supply chain, and INSM (internal network security monitoring)",
|
|
1630
|
+
"CISA + EPA joint guidance evolution for water/wastewater following the 2023 Unitronics campaign and the 2024 EPA enforcement memorandum",
|
|
1631
|
+
"TSA Pipeline Security Directive renewal cadence (SD Pipeline-2021-02C reissued mid-2025, next reissue cycle anticipated mid-2026)",
|
|
1632
|
+
"EU NCCS-G (Network Code on Cybersecurity for Cross-Border Electricity Flows, Reg. (EU) 2024/1366) phased compliance milestones through 2027 for ENTSO-E, EU DSO Entity, and impact-tier classified operators",
|
|
1633
|
+
"AESCSF 2025 refresh by AEMO with renewable/DER specific maturity indicators",
|
|
1634
|
+
"UL 2941 (DER cybersecurity) and IEEE 1547.3-2023 (DER cyber) adoption into US state PUC interconnection rules",
|
|
1635
|
+
"MadIoT-class research on consumer-IoT-driven grid frequency manipulation moving from proof-of-concept to attributed campaigns",
|
|
1636
|
+
"ICS-CERT advisory feed (https://www.cisa.gov/news-events/cybersecurity-advisories/ics-advisories) for vendor CVEs in Siemens, Rockwell, Schneider Electric, ABB, GE Vernova, Hitachi Energy, AVEVA / OSIsoft PI"
|
|
1637
|
+
],
|
|
1638
|
+
"signature": "c/l7dOHe0Zj6Ag3abUaEie6o0f8M4rhY5aPI9/wG4z6FDue9PzCVw8vUGoITFgg89g97lMfy2C3CE2PegQoFCw==",
|
|
1639
|
+
"signed_at": "2026-05-11T23:30:00.510Z"
|
|
1640
|
+
},
|
|
1641
|
+
{
|
|
1642
|
+
"name": "api-security",
|
|
1643
|
+
"version": "1.0.0",
|
|
1644
|
+
"path": "skills/api-security/skill.md",
|
|
1645
|
+
"description": "API security for mid-2026 — OWASP API Top 10 2023, AI-API specific (rate limits, prompt-shape egress, MCP HTTP transport), GraphQL + gRPC + REST + WebSocket attack surfaces, API gateway posture, BOLA/BFLA/SSRF/Mass Assignment",
|
|
1646
|
+
"triggers": [
|
|
1647
|
+
"api security",
|
|
1648
|
+
"owasp api top 10",
|
|
1649
|
+
"bola",
|
|
1650
|
+
"bfla",
|
|
1651
|
+
"mass assignment",
|
|
1652
|
+
"api gateway",
|
|
1653
|
+
"rate limiting",
|
|
1654
|
+
"graphql security",
|
|
1655
|
+
"grpc security",
|
|
1656
|
+
"rest security",
|
|
1657
|
+
"websocket security",
|
|
1658
|
+
"ai api security",
|
|
1659
|
+
"mcp transport",
|
|
1660
|
+
"openapi security"
|
|
1661
|
+
],
|
|
1662
|
+
"data_deps": [
|
|
1663
|
+
"cve-catalog.json",
|
|
1664
|
+
"atlas-ttps.json",
|
|
1665
|
+
"framework-control-gaps.json",
|
|
1666
|
+
"cwe-catalog.json",
|
|
1667
|
+
"d3fend-catalog.json",
|
|
1668
|
+
"rfc-references.json"
|
|
1669
|
+
],
|
|
1670
|
+
"atlas_refs": [
|
|
1671
|
+
"AML.T0096",
|
|
1672
|
+
"AML.T0017"
|
|
1673
|
+
],
|
|
1674
|
+
"attack_refs": [
|
|
1675
|
+
"T1190",
|
|
1676
|
+
"T1078",
|
|
1677
|
+
"T1567"
|
|
1678
|
+
],
|
|
1679
|
+
"framework_gaps": [
|
|
1680
|
+
"OWASP-ASVS-v5.0-V14",
|
|
1681
|
+
"NIST-800-218-SSDF",
|
|
1682
|
+
"ISO-27001-2022-A.8.28",
|
|
1683
|
+
"NIST-800-53-AC-2"
|
|
1684
|
+
],
|
|
1685
|
+
"rfc_refs": [
|
|
1686
|
+
"RFC-8446",
|
|
1687
|
+
"RFC-9114",
|
|
1688
|
+
"RFC-7519",
|
|
1689
|
+
"RFC-8725",
|
|
1690
|
+
"RFC-6749",
|
|
1691
|
+
"RFC-9700",
|
|
1692
|
+
"RFC-9421"
|
|
1693
|
+
],
|
|
1694
|
+
"cwe_refs": [
|
|
1695
|
+
"CWE-287",
|
|
1696
|
+
"CWE-862",
|
|
1697
|
+
"CWE-863",
|
|
1698
|
+
"CWE-918",
|
|
1699
|
+
"CWE-200",
|
|
1700
|
+
"CWE-352",
|
|
1701
|
+
"CWE-22",
|
|
1702
|
+
"CWE-77",
|
|
1703
|
+
"CWE-1188"
|
|
1704
|
+
],
|
|
1705
|
+
"d3fend_refs": [],
|
|
1706
|
+
"last_threat_review": "2026-05-11",
|
|
1707
|
+
"signature": "9FgcJvYeo07QxQ+mnVRQk4jYLDMO/AVSXMs8cueO2f/qMOTQmrhBMVhj5ze7hzvXpGkp7EK/3Q1XKqde61JMAg==",
|
|
1708
|
+
"signed_at": "2026-05-11T23:30:00.510Z"
|
|
1709
|
+
},
|
|
1710
|
+
{
|
|
1711
|
+
"name": "cloud-security",
|
|
1712
|
+
"version": "1.0.0",
|
|
1713
|
+
"path": "skills/cloud-security/skill.md",
|
|
1714
|
+
"description": "Cloud security for mid-2026 — CSPM/CWPP/CNAPP posture, CSA CCM v4, AWS/Azure/GCP shared responsibility, cloud workload identity federation, runtime security with eBPF, AI workloads on cloud",
|
|
1715
|
+
"triggers": [
|
|
1716
|
+
"cloud security",
|
|
1717
|
+
"cspm",
|
|
1718
|
+
"cwpp",
|
|
1719
|
+
"cnapp",
|
|
1720
|
+
"csa ccm",
|
|
1721
|
+
"aws security",
|
|
1722
|
+
"azure security",
|
|
1723
|
+
"gcp security",
|
|
1724
|
+
"cloud iam",
|
|
1725
|
+
"workload identity",
|
|
1726
|
+
"irsa",
|
|
1727
|
+
"cloud runtime",
|
|
1728
|
+
"shared responsibility",
|
|
1729
|
+
"multi cloud",
|
|
1730
|
+
"falco"
|
|
1731
|
+
],
|
|
1732
|
+
"data_deps": [
|
|
1733
|
+
"cve-catalog.json",
|
|
1734
|
+
"atlas-ttps.json",
|
|
1735
|
+
"framework-control-gaps.json",
|
|
1736
|
+
"cwe-catalog.json",
|
|
1737
|
+
"d3fend-catalog.json",
|
|
1738
|
+
"rfc-references.json"
|
|
1739
|
+
],
|
|
1740
|
+
"atlas_refs": [
|
|
1741
|
+
"AML.T0010",
|
|
1742
|
+
"AML.T0017"
|
|
1743
|
+
],
|
|
1744
|
+
"attack_refs": [
|
|
1745
|
+
"T1078",
|
|
1746
|
+
"T1530",
|
|
1747
|
+
"T1190",
|
|
1748
|
+
"T1552"
|
|
1749
|
+
],
|
|
1750
|
+
"framework_gaps": [
|
|
1751
|
+
"NIST-800-53-CM-7",
|
|
1752
|
+
"ISO-27001-2022-A.8.30",
|
|
1753
|
+
"SOC2-CC9-vendor-management",
|
|
1754
|
+
"FedRAMP-Rev5-Moderate"
|
|
1755
|
+
],
|
|
1756
|
+
"rfc_refs": [
|
|
1757
|
+
"RFC-8446",
|
|
1758
|
+
"RFC-9180",
|
|
1759
|
+
"RFC-7519",
|
|
1760
|
+
"RFC-8725"
|
|
1761
|
+
],
|
|
1762
|
+
"cwe_refs": [
|
|
1763
|
+
"CWE-287",
|
|
1764
|
+
"CWE-862",
|
|
1765
|
+
"CWE-732",
|
|
1766
|
+
"CWE-200",
|
|
1767
|
+
"CWE-1188",
|
|
1768
|
+
"CWE-798"
|
|
1769
|
+
],
|
|
1770
|
+
"d3fend_refs": [],
|
|
1771
|
+
"last_threat_review": "2026-05-11",
|
|
1772
|
+
"forward_watch": [
|
|
1773
|
+
"CSA CCM v5 (in development) for AI-workload-aware control objectives and shared-responsibility refinement on managed AI services (Bedrock, Azure OpenAI, Vertex)",
|
|
1774
|
+
"FedRAMP 20x continuous authorization transition through 2026 — machine-readable OSCAL controls, automated significant-change review, impact on commercial CSP authorizations",
|
|
1775
|
+
"EU CRA (Cyber Resilience Act) digital-element requirements for cloud-shipped products and managed services starting Dec 2027 — three-year manufacturer transition already affecting CSP roadmaps",
|
|
1776
|
+
"EU EUCS (European Cybersecurity Certification Scheme for Cloud Services) finalisation and adoption by ENISA — high-assurance tier requirements still being negotiated mid-2026",
|
|
1777
|
+
"NIS2 essential-entity sectoral guidance maturation for cloud / managed-service-provider risk management (Art. 21 measures and supply-chain Art. 22 obligations)",
|
|
1778
|
+
"DORA TLPT (threat-led penetration testing) extension to cloud-hosted critical ICT services — RTS adoption and supervisory practice still evolving",
|
|
1779
|
+
"JP ISMAP-LIU (Information system Security Management and Assessment Program for Low Impact Use) acceptance into procurement workflows; ISMAP base programme audit cycle refresh",
|
|
1780
|
+
"SG MTCS SS 584:2020 revision cycle for managed AI services and confidential computing",
|
|
1781
|
+
"IN MeitY empanelment renewal and Cert-In CSP audit baseline updates following 2025 incident reporting directive amendments",
|
|
1782
|
+
"CN MLPS 2.0 (Multi-Level Protection Scheme) cross-border cloud data-handling requirements under the 2024 Network Data Security Management Regulations",
|
|
1783
|
+
"NYDFS 23 NYCRR 500 Amendment 2 (effective Nov 2024 with phased Nov 2025 / Nov 2026 milestones) third-party CSP risk assessment and MFA requirements",
|
|
1784
|
+
"AWS Bedrock, Azure OpenAI, GCP Vertex AI shared-responsibility documentation drift — each major CSP refreshes the AI-service responsibility line every 6–12 months; track for control-mapping breakage",
|
|
1785
|
+
"eBPF-based runtime detection coverage of confidential-computing enclaves (AWS Nitro Enclaves, Azure Confidential VMs, GCP Confidential Space) — partial visibility is a tracked detection gap",
|
|
1786
|
+
"CISA KEV additions for cloud-control-plane CVEs (IMDSv1 abuses, federation token mishandling, cross-tenant boundary failures); CISA Cybersecurity Advisories for cross-cloud advisories"
|
|
1787
|
+
],
|
|
1788
|
+
"signature": "xRA0XZf7VPtuBtbsm41bay9yBLphw/hlL3YxIUrpko5g9ldM3oJe9o1qSwzIj/wSnQSI29qqPpNsnlks+HEOCA==",
|
|
1789
|
+
"signed_at": "2026-05-11T23:30:00.510Z"
|
|
1790
|
+
},
|
|
1791
|
+
{
|
|
1792
|
+
"name": "container-runtime-security",
|
|
1793
|
+
"version": "1.0.0",
|
|
1794
|
+
"path": "skills/container-runtime-security/skill.md",
|
|
1795
|
+
"description": "Container + Kubernetes runtime security for mid-2026 — CIS K8s Benchmark, NSA/CISA Hardening, Pod Security Standards, Kyverno/Gatekeeper admission, Sigstore policy-controller, eBPF runtime detection (Falco/Tetragon), AI inference workload hardening",
|
|
1796
|
+
"triggers": [
|
|
1797
|
+
"container security",
|
|
1798
|
+
"kubernetes security",
|
|
1799
|
+
"k8s security",
|
|
1800
|
+
"cis kubernetes",
|
|
1801
|
+
"nsa hardening",
|
|
1802
|
+
"pod security standards",
|
|
1803
|
+
"kyverno",
|
|
1804
|
+
"gatekeeper",
|
|
1805
|
+
"opa",
|
|
1806
|
+
"falco",
|
|
1807
|
+
"tetragon",
|
|
1808
|
+
"sigstore policy",
|
|
1809
|
+
"admission controller",
|
|
1810
|
+
"networkpolicy",
|
|
1811
|
+
"cilium",
|
|
1812
|
+
"kserve",
|
|
1813
|
+
"vllm"
|
|
1814
|
+
],
|
|
1815
|
+
"data_deps": [
|
|
1816
|
+
"cve-catalog.json",
|
|
1817
|
+
"atlas-ttps.json",
|
|
1818
|
+
"framework-control-gaps.json",
|
|
1819
|
+
"cwe-catalog.json",
|
|
1820
|
+
"d3fend-catalog.json",
|
|
1821
|
+
"rfc-references.json"
|
|
1822
|
+
],
|
|
1823
|
+
"atlas_refs": [
|
|
1824
|
+
"AML.T0010"
|
|
1825
|
+
],
|
|
1826
|
+
"attack_refs": [
|
|
1827
|
+
"T1610",
|
|
1828
|
+
"T1611",
|
|
1829
|
+
"T1068",
|
|
1830
|
+
"T1190"
|
|
1831
|
+
],
|
|
1832
|
+
"framework_gaps": [
|
|
1833
|
+
"NIST-800-53-CM-7",
|
|
1834
|
+
"ISO-27001-2022-A.8.28",
|
|
1835
|
+
"SLSA-v1.0-Build-L3"
|
|
1836
|
+
],
|
|
1837
|
+
"rfc_refs": [
|
|
1838
|
+
"RFC-8446",
|
|
1839
|
+
"RFC-8032"
|
|
1840
|
+
],
|
|
1841
|
+
"cwe_refs": [
|
|
1842
|
+
"CWE-269",
|
|
1843
|
+
"CWE-732",
|
|
1844
|
+
"CWE-1188",
|
|
1845
|
+
"CWE-787",
|
|
1846
|
+
"CWE-1395"
|
|
1847
|
+
],
|
|
1848
|
+
"d3fend_refs": [],
|
|
1849
|
+
"last_threat_review": "2026-05-11",
|
|
1850
|
+
"signature": "GcU50DStuN1gU/Evm/sFRgeieQbqffVp12rgbGnasRX89Q7kM4ltFXB+bgCXHIvICzYb78hPIifWQb9UVupWBQ==",
|
|
1851
|
+
"signed_at": "2026-05-11T23:30:00.511Z"
|
|
1852
|
+
},
|
|
1853
|
+
{
|
|
1854
|
+
"name": "mlops-security",
|
|
1855
|
+
"version": "1.0.0",
|
|
1856
|
+
"path": "skills/mlops-security/skill.md",
|
|
1857
|
+
"description": "MLOps pipeline security for mid-2026 — training data integrity, model registry signing, deployment pipeline provenance, inference serving hardening, drift detection, feedback loop integrity; covers MLflow / Kubeflow / Vertex AI / SageMaker / Azure ML / Hugging Face",
|
|
1858
|
+
"triggers": [
|
|
1859
|
+
"mlops security",
|
|
1860
|
+
"ml pipeline security",
|
|
1861
|
+
"model registry security",
|
|
1862
|
+
"training data integrity",
|
|
1863
|
+
"mlflow",
|
|
1864
|
+
"kubeflow",
|
|
1865
|
+
"vertex ai",
|
|
1866
|
+
"sagemaker",
|
|
1867
|
+
"azure ml",
|
|
1868
|
+
"hugging face",
|
|
1869
|
+
"model signing",
|
|
1870
|
+
"model card",
|
|
1871
|
+
"data card",
|
|
1872
|
+
"feature store",
|
|
1873
|
+
"drift detection",
|
|
1874
|
+
"model monitoring"
|
|
1875
|
+
],
|
|
1876
|
+
"data_deps": [
|
|
1877
|
+
"cve-catalog.json",
|
|
1878
|
+
"atlas-ttps.json",
|
|
1879
|
+
"framework-control-gaps.json",
|
|
1880
|
+
"cwe-catalog.json",
|
|
1881
|
+
"d3fend-catalog.json",
|
|
1882
|
+
"rfc-references.json"
|
|
1883
|
+
],
|
|
1884
|
+
"atlas_refs": [
|
|
1885
|
+
"AML.T0010",
|
|
1886
|
+
"AML.T0018",
|
|
1887
|
+
"AML.T0020",
|
|
1888
|
+
"AML.T0043",
|
|
1889
|
+
"AML.T0017"
|
|
1890
|
+
],
|
|
1891
|
+
"attack_refs": [
|
|
1892
|
+
"T1195.001",
|
|
1893
|
+
"T1565"
|
|
1894
|
+
],
|
|
1895
|
+
"framework_gaps": [
|
|
1896
|
+
"NIST-800-218-SSDF",
|
|
1897
|
+
"SLSA-v1.0-Build-L3",
|
|
1898
|
+
"ISO-IEC-42001-2023-clause-6.1.2",
|
|
1899
|
+
"NIST-AI-RMF-MEASURE-2.5",
|
|
1900
|
+
"OWASP-LLM-Top-10-2025-LLM08"
|
|
1901
|
+
],
|
|
1902
|
+
"rfc_refs": [
|
|
1903
|
+
"RFC-8032"
|
|
1904
|
+
],
|
|
1905
|
+
"cwe_refs": [
|
|
1906
|
+
"CWE-1426",
|
|
1907
|
+
"CWE-1395",
|
|
1908
|
+
"CWE-1357",
|
|
1909
|
+
"CWE-502"
|
|
1910
|
+
],
|
|
1911
|
+
"d3fend_refs": [],
|
|
1912
|
+
"last_threat_review": "2026-05-11",
|
|
1913
|
+
"forward_watch": [
|
|
1914
|
+
"CycloneDX 1.7 ML-BOM enrichment — training-data lineage fields and model-card embedding stabilize; re-baseline ML-BOM coverage when published",
|
|
1915
|
+
"SPDX 3.1 AI / Dataset profile maturation — dataset provenance schema firms up; re-audit training-data lineage attestations",
|
|
1916
|
+
"OpenSSF model-signing emergence to v1.0 — Sigstore-based model-weight signing; track for production adoption and admission-control integration",
|
|
1917
|
+
"SLSA v1.1 ML profile (draft) — model-provenance extension for training-run attestation chains; track ID and section changes",
|
|
1918
|
+
"EU AI Act high-risk technical-file implementing acts (2026-2027) — operational requirements for Article 10 / 13 / 15 documentation may pin ML-BOM or model-signing",
|
|
1919
|
+
"MITRE ATLAS v5.2 — track AML.T0010 sub-technique expansion and any new MLOps-pipeline-specific TTPs"
|
|
1920
|
+
],
|
|
1921
|
+
"signature": "onIazpFoL1t4PMNRsoF06ggnl7BzCKjt0x+ZmVfWfyt1V06DgllsrbN3AAz4+g4jW2Sc71q0vIFKfwEUWpGVAQ==",
|
|
1922
|
+
"signed_at": "2026-05-11T23:30:00.511Z"
|
|
1923
|
+
},
|
|
1924
|
+
{
|
|
1925
|
+
"name": "incident-response-playbook",
|
|
1926
|
+
"version": "1.0.0",
|
|
1927
|
+
"path": "skills/incident-response-playbook/skill.md",
|
|
1928
|
+
"description": "Incident response playbook design for mid-2026 — NIST 800-61r3, ISO 27035, ATT&CK-driven detection, PICERL phases, AI-class incident handling (prompt injection breach, model exfiltration, AI-API C2), cross-jurisdiction breach notification timing",
|
|
1929
|
+
"triggers": [
|
|
1930
|
+
"incident response",
|
|
1931
|
+
"ir playbook",
|
|
1932
|
+
"csirt",
|
|
1933
|
+
"picerl",
|
|
1934
|
+
"nist 800-61",
|
|
1935
|
+
"iso 27035",
|
|
1936
|
+
"breach notification",
|
|
1937
|
+
"incident handler",
|
|
1938
|
+
"blue team",
|
|
1939
|
+
"soc playbook",
|
|
1940
|
+
"ai incident",
|
|
1941
|
+
"prompt injection incident",
|
|
1942
|
+
"model exfiltration incident"
|
|
1943
|
+
],
|
|
1944
|
+
"data_deps": [
|
|
1945
|
+
"cve-catalog.json",
|
|
1946
|
+
"atlas-ttps.json",
|
|
1947
|
+
"framework-control-gaps.json",
|
|
1948
|
+
"global-frameworks.json",
|
|
1949
|
+
"cwe-catalog.json",
|
|
1950
|
+
"d3fend-catalog.json",
|
|
1951
|
+
"zeroday-lessons.json"
|
|
1952
|
+
],
|
|
1953
|
+
"atlas_refs": [
|
|
1954
|
+
"AML.T0096",
|
|
1955
|
+
"AML.T0017",
|
|
1956
|
+
"AML.T0051"
|
|
1957
|
+
],
|
|
1958
|
+
"attack_refs": [
|
|
1959
|
+
"T1486",
|
|
1960
|
+
"T1041",
|
|
1961
|
+
"T1567",
|
|
1962
|
+
"T1078"
|
|
1963
|
+
],
|
|
1964
|
+
"framework_gaps": [
|
|
1965
|
+
"NIST-800-53-AC-2",
|
|
1966
|
+
"ISO-27001-2022-A.8.16",
|
|
1967
|
+
"SOC2-CC7-anomaly-detection"
|
|
1968
|
+
],
|
|
1969
|
+
"rfc_refs": [],
|
|
1970
|
+
"cwe_refs": [],
|
|
1971
|
+
"d3fend_refs": [],
|
|
1972
|
+
"last_threat_review": "2026-05-11",
|
|
1973
|
+
"forward_watch": [
|
|
1974
|
+
"NIST 800-61r3 minor revisions (expected 2026-2027) aligning incident-handling language with the in-force EU CRA Art. 11 24h clock and EU AI Act Art. 73 serious-incident reporting",
|
|
1975
|
+
"ISO/IEC 27035-3:2026 (technical incident response operations) — final publication expected Q3 2026, expected to formalize AI-class incident sub-types currently absent from 27035-1/-2",
|
|
1976
|
+
"CSAF 2.1 inclusion of incident-status profile (separate from VEX) for correlated advisory + incident records",
|
|
1977
|
+
"MITRE ATLAS additions for incident-response-relevant techniques: AI-agent-initiated unauthorized action, training-data exfiltration via inference-time prompts",
|
|
1978
|
+
"ENISA single-reporting-platform expansion: CRA Art. 11 channel goes operational 2026-09, NIS2 Art. 23 incident-reporting overlap to be reconciled",
|
|
1979
|
+
"AU SOCI Act expanded sector coverage (data-storage and processing entities added 2024; further mandatory-reporting tiers under review)",
|
|
1980
|
+
"IL INCD Incident Response Process v4 (slated for 2026-2027) consolidating AI-incident sub-class",
|
|
1981
|
+
"NYDFS 23 NYCRR 500.17 amendments tightening ransom-payment 24h disclosure operationalization"
|
|
1982
|
+
],
|
|
1983
|
+
"signature": "P0Yv4CtqbnBNP6nSIxQUYYHL7T7ci+iE7iE2UXVfnMPeWVdKG2nvRePjBXc3JZTLima1Txn/I5ocDNhLTIeUAQ==",
|
|
1984
|
+
"signed_at": "2026-05-11T23:30:00.512Z"
|
|
1985
|
+
},
|
|
1986
|
+
{
|
|
1987
|
+
"name": "email-security-anti-phishing",
|
|
1988
|
+
"version": "1.0.0",
|
|
1989
|
+
"path": "skills/email-security-anti-phishing/skill.md",
|
|
1990
|
+
"description": "Email security + anti-phishing for mid-2026 — SPF/DKIM/DMARC/BIMI/ARC/MTA-STS/TLSRPT, AI-augmented phishing (vishing, deepfake video, hyperpersonalized email), Business Email Compromise, secure email gateways",
|
|
1991
|
+
"triggers": [
|
|
1992
|
+
"email security",
|
|
1993
|
+
"anti-phishing",
|
|
1994
|
+
"phishing",
|
|
1995
|
+
"spear phishing",
|
|
1996
|
+
"bec",
|
|
1997
|
+
"business email compromise",
|
|
1998
|
+
"dmarc",
|
|
1999
|
+
"dkim",
|
|
2000
|
+
"spf",
|
|
2001
|
+
"bimi",
|
|
2002
|
+
"arc",
|
|
2003
|
+
"mta-sts",
|
|
2004
|
+
"tlsrpt",
|
|
2005
|
+
"vishing",
|
|
2006
|
+
"deepfake phishing",
|
|
2007
|
+
"ai phishing",
|
|
2008
|
+
"secure email gateway"
|
|
2009
|
+
],
|
|
2010
|
+
"data_deps": [
|
|
2011
|
+
"cve-catalog.json",
|
|
2012
|
+
"atlas-ttps.json",
|
|
2013
|
+
"framework-control-gaps.json",
|
|
2014
|
+
"cwe-catalog.json",
|
|
2015
|
+
"d3fend-catalog.json",
|
|
2016
|
+
"rfc-references.json",
|
|
2017
|
+
"dlp-controls.json"
|
|
2018
|
+
],
|
|
2019
|
+
"atlas_refs": [],
|
|
2020
|
+
"attack_refs": [
|
|
2021
|
+
"T1566",
|
|
2022
|
+
"T1566.001",
|
|
2023
|
+
"T1566.002",
|
|
2024
|
+
"T1566.003",
|
|
2025
|
+
"T1078"
|
|
2026
|
+
],
|
|
2027
|
+
"framework_gaps": [
|
|
2028
|
+
"NIST-800-53-SI-3",
|
|
2029
|
+
"ISO-27001-2022-A.8.16",
|
|
2030
|
+
"SOC2-CC7-anomaly-detection"
|
|
2031
|
+
],
|
|
2032
|
+
"rfc_refs": [],
|
|
2033
|
+
"cwe_refs": [],
|
|
2034
|
+
"d3fend_refs": [],
|
|
2035
|
+
"last_threat_review": "2026-05-11",
|
|
2036
|
+
"signature": "2pv81lLRbazpHqundCANb3YiLB4lkVsYctIDvI8rxSvHxhPS9jYXqmAoB5APSdDuOaew6XqpfZOehQUj9WmyBw==",
|
|
2037
|
+
"signed_at": "2026-05-11T23:30:00.512Z"
|
|
2038
|
+
},
|
|
2039
|
+
{
|
|
2040
|
+
"name": "age-gates-child-safety",
|
|
2041
|
+
"version": "1.0.0",
|
|
2042
|
+
"path": "skills/age-gates-child-safety/skill.md",
|
|
2043
|
+
"description": "Age-related gates and child online safety for mid-2026 — COPPA + CIPA + California AADC + GDPR Art. 8 + DSA Art. 28 + UK Online Safety Act + UK Children's Code + AU Online Safety Act + IN DPDPA child provisions + KOSA pending; age verification standards (IEEE 2089-2021, OpenID Connect age claims); AI product age policies",
|
|
2044
|
+
"triggers": [
|
|
2045
|
+
"age gate",
|
|
2046
|
+
"age gates",
|
|
2047
|
+
"age verification",
|
|
2048
|
+
"age assurance",
|
|
2049
|
+
"child online safety",
|
|
2050
|
+
"coppa",
|
|
2051
|
+
"cipa",
|
|
2052
|
+
"california aadc",
|
|
2053
|
+
"children's code",
|
|
2054
|
+
"uk online safety act",
|
|
2055
|
+
"kosa",
|
|
2056
|
+
"gdpr article 8",
|
|
2057
|
+
"dsa article 28",
|
|
2058
|
+
"parental consent",
|
|
2059
|
+
"csam",
|
|
2060
|
+
"child safety",
|
|
2061
|
+
"ofcom",
|
|
2062
|
+
"esafety",
|
|
2063
|
+
"children's online safety"
|
|
2064
|
+
],
|
|
2065
|
+
"data_deps": [
|
|
2066
|
+
"cve-catalog.json",
|
|
2067
|
+
"atlas-ttps.json",
|
|
2068
|
+
"framework-control-gaps.json",
|
|
2069
|
+
"global-frameworks.json",
|
|
2070
|
+
"cwe-catalog.json",
|
|
2071
|
+
"d3fend-catalog.json",
|
|
2072
|
+
"dlp-controls.json"
|
|
2073
|
+
],
|
|
2074
|
+
"atlas_refs": [],
|
|
2075
|
+
"attack_refs": [
|
|
2076
|
+
"T1078",
|
|
2077
|
+
"T1567"
|
|
2078
|
+
],
|
|
2079
|
+
"framework_gaps": [
|
|
2080
|
+
"ISO-27001-2022-A.8.30",
|
|
2081
|
+
"NIST-800-53-AC-2",
|
|
2082
|
+
"SOC2-CC6-logical-access"
|
|
2083
|
+
],
|
|
2084
|
+
"rfc_refs": [],
|
|
2085
|
+
"cwe_refs": [
|
|
2086
|
+
"CWE-200",
|
|
2087
|
+
"CWE-287",
|
|
2088
|
+
"CWE-862"
|
|
2089
|
+
],
|
|
2090
|
+
"d3fend_refs": [],
|
|
2091
|
+
"last_threat_review": "2026-05-11",
|
|
2092
|
+
"forward_watch": [
|
|
2093
|
+
"KOSA (Kids Online Safety Act) federal enactment status — reintroduced 2024-2025 with bipartisan support; if enacted, duty-of-care + safest-defaults + age-appropriate-design obligations become US federal floor",
|
|
2094
|
+
"Ofcom UK Online Safety Act child-safety codes — illegal-content codes live July 2025; child-safety codes phasing through 2026 with iterative enforcement guidance",
|
|
2095
|
+
"California AADC (AB-2273) — Sept 2023 federal injunction (NetChoice v. Bonta), 2024 partial revival; track Ninth Circuit / SCOTUS posture and state legislative response",
|
|
2096
|
+
"AU social media under-16 ban — Online Safety Amendment (Social Media Minimum Age) Act 2024 passed Nov 2024; implementation deferred to late 2025; age-assurance method finalisation pending",
|
|
2097
|
+
"EU CSAM Regulation (\"chat control\") — Commission proposal 2022, contested through 2024-2025; if adopted, automated detection on encrypted communications becomes mandatory with significant fundamental-rights challenge",
|
|
2098
|
+
"NIST IR on Age Assurance — pending publication; will operationalise age-assurance levels for US federal procurement",
|
|
2099
|
+
"euCONSENT pilot outcomes — EU age-verification interoperability scheme; if scaled, becomes the de facto Member State age-verification reference architecture",
|
|
2100
|
+
"AI product age policy enforcement — Character.ai litigation (2024 minor-suicide complaint) testing duty-of-care for AI companion apps; ChatGPT / Claude / Gemini under-13 / under-18 enforcement evolving via FTC + state AG actions",
|
|
2101
|
+
"France SREN (Securing and Regulating the Digital Space) Act 2024 — ARCOM age-verification referential for adult content services; double-anonymity model under deployment",
|
|
2102
|
+
"US state adult-site age-verification laws — 19+ states by mid-2026 (TX HB 18 upheld by SCOTUS June 2025 in Free Speech Coalition v. Paxton); track ongoing challenges in remaining states"
|
|
2103
|
+
],
|
|
2104
|
+
"signature": "BJ/YYnGVXeSBaR9oWAVrcNX7Wz+kE8R4CghX6+XEI/qY89fyrkKNNwo2veqqf49wffJhHVJ1wTp8ZDECjNp+Dw==",
|
|
2105
|
+
"signed_at": "2026-05-11T23:30:00.512Z"
|
|
2106
|
+
}
|
|
2107
|
+
]
|
|
2108
|
+
}
|