@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
|
@@ -0,0 +1,362 @@
|
|
|
1
|
+
{
|
|
2
|
+
"_meta": {
|
|
3
|
+
"schema_version": "1.0.0",
|
|
4
|
+
"note": "Per-artifact 'last changed' feed sorted descending by date. Skill events from manifest.last_threat_review; catalog events from data/<catalog>.json _meta.last_updated.",
|
|
5
|
+
"event_count": 49
|
|
6
|
+
},
|
|
7
|
+
"events": [
|
|
8
|
+
{
|
|
9
|
+
"date": "2026-05-11",
|
|
10
|
+
"type": "skill_review",
|
|
11
|
+
"artifact": "researcher",
|
|
12
|
+
"path": "skills/researcher/skill.md",
|
|
13
|
+
"note": "Triage entry-point for raw threat intel — researches an input across all exceptd data catalogs, RWEP-scores it, and routes the operator to the right specialized skill(s)"
|
|
14
|
+
},
|
|
15
|
+
{
|
|
16
|
+
"date": "2026-05-11",
|
|
17
|
+
"type": "skill_review",
|
|
18
|
+
"artifact": "attack-surface-pentest",
|
|
19
|
+
"path": "skills/attack-surface-pentest/skill.md",
|
|
20
|
+
"note": "Modern attack surface management + pen testing methodology for AI-era environments — NIST 800-115, OWASP WSTG, PTES, ATT&CK-driven adversary emulation, TIBER-EU"
|
|
21
|
+
},
|
|
22
|
+
{
|
|
23
|
+
"date": "2026-05-11",
|
|
24
|
+
"type": "skill_review",
|
|
25
|
+
"artifact": "fuzz-testing-strategy",
|
|
26
|
+
"path": "skills/fuzz-testing-strategy/skill.md",
|
|
27
|
+
"note": "Continuous fuzzing as a security control — coverage-guided fuzz (AFL++/libFuzzer), AI-assisted fuzz, OSS-Fuzz integration, kernel fuzz (syzkaller), AI-API fuzz, integration into CI/CD as compliance evidence"
|
|
28
|
+
},
|
|
29
|
+
{
|
|
30
|
+
"date": "2026-05-11",
|
|
31
|
+
"type": "skill_review",
|
|
32
|
+
"artifact": "dlp-gap-analysis",
|
|
33
|
+
"path": "skills/dlp-gap-analysis/skill.md",
|
|
34
|
+
"note": "DLP gap analysis for mid-2026 — legacy DLP misses LLM prompts, MCP tool args, RAG retrievals, embedding-store exfil, and code-completion telemetry. Audit channels, classifiers, protected surfaces, enforcement actions, and evidence trails against modern threat reality and cross-jurisdictional privacy regimes"
|
|
35
|
+
},
|
|
36
|
+
{
|
|
37
|
+
"date": "2026-05-11",
|
|
38
|
+
"type": "skill_review",
|
|
39
|
+
"artifact": "supply-chain-integrity",
|
|
40
|
+
"path": "skills/supply-chain-integrity/skill.md",
|
|
41
|
+
"note": "Supply-chain integrity for mid-2026 — SLSA L3+, in-toto attestations, Sigstore signing, SBOM (CycloneDX/SPDX), VEX via CSAF 2.0, AI-generated code provenance, model weights as supply-chain artifacts"
|
|
42
|
+
},
|
|
43
|
+
{
|
|
44
|
+
"date": "2026-05-11",
|
|
45
|
+
"type": "skill_review",
|
|
46
|
+
"artifact": "defensive-countermeasure-mapping",
|
|
47
|
+
"path": "skills/defensive-countermeasure-mapping/skill.md",
|
|
48
|
+
"note": "Map offensive findings (CVE / TTP / framework gap) to MITRE D3FEND defensive countermeasures with explicit defense-in-depth, least-privilege, and zero-trust layering"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"date": "2026-05-11",
|
|
52
|
+
"type": "skill_review",
|
|
53
|
+
"artifact": "identity-assurance",
|
|
54
|
+
"path": "skills/identity-assurance/skill.md",
|
|
55
|
+
"note": "Identity assurance for mid-2026 — NIST 800-63 AAL/IAL/FAL, FIDO2/WebAuthn passkeys, OIDC/SAML/SCIM, agent-as-principal identity, short-lived workload tokens, OAuth 2.0 + RFC 9700 BCP"
|
|
56
|
+
},
|
|
57
|
+
{
|
|
58
|
+
"date": "2026-05-11",
|
|
59
|
+
"type": "skill_review",
|
|
60
|
+
"artifact": "ot-ics-security",
|
|
61
|
+
"path": "skills/ot-ics-security/skill.md",
|
|
62
|
+
"note": "OT / ICS security for mid-2026 — NIST 800-82r3, IEC 62443-3-3, NERC CIP, IT/OT convergence risks, AI-augmented HMI threats, ICS-specific TTPs (ATT&CK for ICS)"
|
|
63
|
+
},
|
|
64
|
+
{
|
|
65
|
+
"date": "2026-05-11",
|
|
66
|
+
"type": "skill_review",
|
|
67
|
+
"artifact": "coordinated-vuln-disclosure",
|
|
68
|
+
"path": "skills/coordinated-vuln-disclosure/skill.md",
|
|
69
|
+
"note": "Coordinated Vulnerability Disclosure for mid-2026 — ISO 29147 (disclosure) + ISO 30111 (handling) + VDP + bug bounty + CSAF 2.0 advisories + security.txt + EU CRA / NIS2 regulator-mandated disclosure + AI vulnerability classes"
|
|
70
|
+
},
|
|
71
|
+
{
|
|
72
|
+
"date": "2026-05-11",
|
|
73
|
+
"type": "skill_review",
|
|
74
|
+
"artifact": "threat-modeling-methodology",
|
|
75
|
+
"path": "skills/threat-modeling-methodology/skill.md",
|
|
76
|
+
"note": "Threat modeling methodologies for mid-2026 — STRIDE, PASTA, LINDDUN (privacy), Cyber Kill Chain, Diamond Model, MITRE Unified Kill Chain, AI-system threat modeling, agent-based threat modeling"
|
|
77
|
+
},
|
|
78
|
+
{
|
|
79
|
+
"date": "2026-05-11",
|
|
80
|
+
"type": "skill_review",
|
|
81
|
+
"artifact": "webapp-security",
|
|
82
|
+
"path": "skills/webapp-security/skill.md",
|
|
83
|
+
"note": "Web application security for mid-2026 — OWASP Top 10 2025, OWASP ASVS v5, CWE root-cause coverage, AI-generated code weakness drift, server-rendered vs SPA tradeoffs, defense-in-depth across the request lifecycle"
|
|
84
|
+
},
|
|
85
|
+
{
|
|
86
|
+
"date": "2026-05-11",
|
|
87
|
+
"type": "skill_review",
|
|
88
|
+
"artifact": "ai-risk-management",
|
|
89
|
+
"path": "skills/ai-risk-management/skill.md",
|
|
90
|
+
"note": "AI governance and risk management for mid-2026 — ISO/IEC 23894 risk process, ISO/IEC 42001 management system, NIST AI RMF, EU AI Act high-risk obligations, AI impact assessments, AI red-team programs, AI incident lifecycle"
|
|
91
|
+
},
|
|
92
|
+
{
|
|
93
|
+
"date": "2026-05-11",
|
|
94
|
+
"type": "skill_review",
|
|
95
|
+
"artifact": "sector-healthcare",
|
|
96
|
+
"path": "skills/sector-healthcare/skill.md",
|
|
97
|
+
"note": "Healthcare sector cybersecurity for mid-2026 — HIPAA + HITRUST + HL7 FHIR security, medical device cyber (FDA + EU MDR), AI-in-healthcare under EU AI Act + FDA AI/ML SaMD guidance, patient data flows through LLM clinical tools"
|
|
98
|
+
},
|
|
99
|
+
{
|
|
100
|
+
"date": "2026-05-11",
|
|
101
|
+
"type": "skill_review",
|
|
102
|
+
"artifact": "sector-financial",
|
|
103
|
+
"path": "skills/sector-financial/skill.md",
|
|
104
|
+
"note": "Financial services cybersecurity for mid-2026 — EU DORA TLPT, PSD2 RTS-SCA, SWIFT CSCF v2026, NYDFS 23 NYCRR 500, FFIEC CAT, MAS TRM, APRA CPS 234, IL BoI Directive 361, OSFI B-13; Threat-Led Pen Testing schemes TIBER-EU + CBEST + iCAST"
|
|
105
|
+
},
|
|
106
|
+
{
|
|
107
|
+
"date": "2026-05-11",
|
|
108
|
+
"type": "skill_review",
|
|
109
|
+
"artifact": "sector-federal-government",
|
|
110
|
+
"path": "skills/sector-federal-government/skill.md",
|
|
111
|
+
"note": "Federal government + defense contractor cybersecurity for mid-2026 — FedRAMP Rev5, CMMC 2.0, EO 14028, NIST 800-171/172 CUI, FISMA, M-22-09 federal Zero Trust, OMB M-24-04 AI risk, CISA BOD/ED; cross-jurisdiction NCSC UK, ENISA EUCC, AU PSPF, IL government cyber methodology"
|
|
112
|
+
},
|
|
113
|
+
{
|
|
114
|
+
"date": "2026-05-11",
|
|
115
|
+
"type": "skill_review",
|
|
116
|
+
"artifact": "sector-energy",
|
|
117
|
+
"path": "skills/sector-energy/skill.md",
|
|
118
|
+
"note": "Electric power + oil & gas + water/wastewater + renewable-integration cybersecurity for mid-2026 — NERC CIP v6/v7, NIST 800-82r3, TSA Pipeline SD-2021-02C, AWWA cyber, EU NIS2 energy + NCCS-G (cross-border electricity), AU AESCSF + SOCI, ENISA energy sector"
|
|
119
|
+
},
|
|
120
|
+
{
|
|
121
|
+
"date": "2026-05-11",
|
|
122
|
+
"type": "skill_review",
|
|
123
|
+
"artifact": "api-security",
|
|
124
|
+
"path": "skills/api-security/skill.md",
|
|
125
|
+
"note": "API security for mid-2026 — OWASP API Top 10 2023, AI-API specific (rate limits, prompt-shape egress, MCP HTTP transport), GraphQL + gRPC + REST + WebSocket attack surfaces, API gateway posture, BOLA/BFLA/SSRF/Mass Assignment"
|
|
126
|
+
},
|
|
127
|
+
{
|
|
128
|
+
"date": "2026-05-11",
|
|
129
|
+
"type": "skill_review",
|
|
130
|
+
"artifact": "cloud-security",
|
|
131
|
+
"path": "skills/cloud-security/skill.md",
|
|
132
|
+
"note": "Cloud security for mid-2026 — CSPM/CWPP/CNAPP posture, CSA CCM v4, AWS/Azure/GCP shared responsibility, cloud workload identity federation, runtime security with eBPF, AI workloads on cloud"
|
|
133
|
+
},
|
|
134
|
+
{
|
|
135
|
+
"date": "2026-05-11",
|
|
136
|
+
"type": "skill_review",
|
|
137
|
+
"artifact": "container-runtime-security",
|
|
138
|
+
"path": "skills/container-runtime-security/skill.md",
|
|
139
|
+
"note": "Container + Kubernetes runtime security for mid-2026 — CIS K8s Benchmark, NSA/CISA Hardening, Pod Security Standards, Kyverno/Gatekeeper admission, Sigstore policy-controller, eBPF runtime detection (Falco/Tetragon), AI inference workload hardening"
|
|
140
|
+
},
|
|
141
|
+
{
|
|
142
|
+
"date": "2026-05-11",
|
|
143
|
+
"type": "skill_review",
|
|
144
|
+
"artifact": "mlops-security",
|
|
145
|
+
"path": "skills/mlops-security/skill.md",
|
|
146
|
+
"note": "MLOps pipeline security for mid-2026 — training data integrity, model registry signing, deployment pipeline provenance, inference serving hardening, drift detection, feedback loop integrity; covers MLflow / Kubeflow / Vertex AI / SageMaker / Azure ML / Hugging Face"
|
|
147
|
+
},
|
|
148
|
+
{
|
|
149
|
+
"date": "2026-05-11",
|
|
150
|
+
"type": "skill_review",
|
|
151
|
+
"artifact": "incident-response-playbook",
|
|
152
|
+
"path": "skills/incident-response-playbook/skill.md",
|
|
153
|
+
"note": "Incident response playbook design for mid-2026 — NIST 800-61r3, ISO 27035, ATT&CK-driven detection, PICERL phases, AI-class incident handling (prompt injection breach, model exfiltration, AI-API C2), cross-jurisdiction breach notification timing"
|
|
154
|
+
},
|
|
155
|
+
{
|
|
156
|
+
"date": "2026-05-11",
|
|
157
|
+
"type": "skill_review",
|
|
158
|
+
"artifact": "email-security-anti-phishing",
|
|
159
|
+
"path": "skills/email-security-anti-phishing/skill.md",
|
|
160
|
+
"note": "Email security + anti-phishing for mid-2026 — SPF/DKIM/DMARC/BIMI/ARC/MTA-STS/TLSRPT, AI-augmented phishing (vishing, deepfake video, hyperpersonalized email), Business Email Compromise, secure email gateways"
|
|
161
|
+
},
|
|
162
|
+
{
|
|
163
|
+
"date": "2026-05-11",
|
|
164
|
+
"type": "skill_review",
|
|
165
|
+
"artifact": "age-gates-child-safety",
|
|
166
|
+
"path": "skills/age-gates-child-safety/skill.md",
|
|
167
|
+
"note": "Age-related gates and child online safety for mid-2026 — COPPA + CIPA + California AADC + GDPR Art. 8 + DSA Art. 28 + UK Online Safety Act + UK Children's Code + AU Online Safety Act + IN DPDPA child provisions + KOSA pending; age verification standards (IEEE 2089-2021, OpenID Connect age claims); AI product age policies"
|
|
168
|
+
},
|
|
169
|
+
{
|
|
170
|
+
"date": "2026-05-11",
|
|
171
|
+
"type": "catalog_update",
|
|
172
|
+
"artifact": "data/cve-catalog.json",
|
|
173
|
+
"path": "data/cve-catalog.json",
|
|
174
|
+
"schema_version": "1.0.0",
|
|
175
|
+
"entry_count": 5
|
|
176
|
+
},
|
|
177
|
+
{
|
|
178
|
+
"date": "2026-05-11",
|
|
179
|
+
"type": "catalog_update",
|
|
180
|
+
"artifact": "data/cwe-catalog.json",
|
|
181
|
+
"path": "data/cwe-catalog.json",
|
|
182
|
+
"schema_version": "1.0.0",
|
|
183
|
+
"entry_count": 34
|
|
184
|
+
},
|
|
185
|
+
{
|
|
186
|
+
"date": "2026-05-11",
|
|
187
|
+
"type": "catalog_update",
|
|
188
|
+
"artifact": "data/d3fend-catalog.json",
|
|
189
|
+
"path": "data/d3fend-catalog.json",
|
|
190
|
+
"schema_version": "1.0.0",
|
|
191
|
+
"entry_count": 20
|
|
192
|
+
},
|
|
193
|
+
{
|
|
194
|
+
"date": "2026-05-11",
|
|
195
|
+
"type": "catalog_update",
|
|
196
|
+
"artifact": "data/dlp-controls.json",
|
|
197
|
+
"path": "data/dlp-controls.json",
|
|
198
|
+
"schema_version": "1.0.0",
|
|
199
|
+
"entry_count": 22
|
|
200
|
+
},
|
|
201
|
+
{
|
|
202
|
+
"date": "2026-05-11",
|
|
203
|
+
"type": "catalog_update",
|
|
204
|
+
"artifact": "data/global-frameworks.json",
|
|
205
|
+
"path": "data/global-frameworks.json",
|
|
206
|
+
"schema_version": "1.3.0",
|
|
207
|
+
"entry_count": 35
|
|
208
|
+
},
|
|
209
|
+
{
|
|
210
|
+
"date": "2026-05-11",
|
|
211
|
+
"type": "catalog_update",
|
|
212
|
+
"artifact": "data/rfc-references.json",
|
|
213
|
+
"path": "data/rfc-references.json",
|
|
214
|
+
"schema_version": "1.0.0",
|
|
215
|
+
"entry_count": 19
|
|
216
|
+
},
|
|
217
|
+
{
|
|
218
|
+
"date": "2026-05-01",
|
|
219
|
+
"type": "skill_review",
|
|
220
|
+
"artifact": "kernel-lpe-triage",
|
|
221
|
+
"path": "skills/kernel-lpe-triage/skill.md",
|
|
222
|
+
"note": "Assess Linux kernel LPE exposure — Copy Fail, Dirty Frag, live-patch vs. reboot remediation"
|
|
223
|
+
},
|
|
224
|
+
{
|
|
225
|
+
"date": "2026-05-01",
|
|
226
|
+
"type": "skill_review",
|
|
227
|
+
"artifact": "ai-attack-surface",
|
|
228
|
+
"path": "skills/ai-attack-surface/skill.md",
|
|
229
|
+
"note": "Comprehensive AI/ML attack surface assessment mapped to MITRE ATLAS v5.1.0 with gap flags"
|
|
230
|
+
},
|
|
231
|
+
{
|
|
232
|
+
"date": "2026-05-01",
|
|
233
|
+
"type": "skill_review",
|
|
234
|
+
"artifact": "mcp-agent-trust",
|
|
235
|
+
"path": "skills/mcp-agent-trust/skill.md",
|
|
236
|
+
"note": "Enumerate MCP trust boundary failures — tool allowlisting, signed manifests, bearer auth, zero-interaction RCE"
|
|
237
|
+
},
|
|
238
|
+
{
|
|
239
|
+
"date": "2026-05-01",
|
|
240
|
+
"type": "skill_review",
|
|
241
|
+
"artifact": "framework-gap-analysis",
|
|
242
|
+
"path": "skills/framework-gap-analysis/skill.md",
|
|
243
|
+
"note": "Feed a framework control ID and threat scenario — receive the gap between what the control covers and what current TTPs require"
|
|
244
|
+
},
|
|
245
|
+
{
|
|
246
|
+
"date": "2026-05-01",
|
|
247
|
+
"type": "skill_review",
|
|
248
|
+
"artifact": "compliance-theater",
|
|
249
|
+
"path": "skills/compliance-theater/skill.md",
|
|
250
|
+
"note": "Detect where an organization passes an audit but remains exposed — seven documented compliance theater patterns"
|
|
251
|
+
},
|
|
252
|
+
{
|
|
253
|
+
"date": "2026-05-01",
|
|
254
|
+
"type": "skill_review",
|
|
255
|
+
"artifact": "exploit-scoring",
|
|
256
|
+
"path": "skills/exploit-scoring/skill.md",
|
|
257
|
+
"note": "Real-World Exploit Priority (RWEP) scoring — CVSS plus KEV, PoC, AI-acceleration, blast radius, live-patch factors"
|
|
258
|
+
},
|
|
259
|
+
{
|
|
260
|
+
"date": "2026-05-01",
|
|
261
|
+
"type": "skill_review",
|
|
262
|
+
"artifact": "rag-pipeline-security",
|
|
263
|
+
"path": "skills/rag-pipeline-security/skill.md",
|
|
264
|
+
"note": "RAG-specific threat model — embedding manipulation, vector store poisoning, retrieval filter bypass, indirect prompt injection"
|
|
265
|
+
},
|
|
266
|
+
{
|
|
267
|
+
"date": "2026-05-01",
|
|
268
|
+
"type": "skill_review",
|
|
269
|
+
"artifact": "ai-c2-detection",
|
|
270
|
+
"path": "skills/ai-c2-detection/skill.md",
|
|
271
|
+
"note": "Detect adversary use of AI APIs as covert C2 — SesameOp pattern, PROMPTFLUX/PROMPTSTEAL behavioral signatures"
|
|
272
|
+
},
|
|
273
|
+
{
|
|
274
|
+
"date": "2026-05-01",
|
|
275
|
+
"type": "skill_review",
|
|
276
|
+
"artifact": "policy-exception-gen",
|
|
277
|
+
"path": "skills/policy-exception-gen/skill.md",
|
|
278
|
+
"note": "Generate defensible policy exceptions for architectural realities — ephemeral infra, AI pipelines, ZTA, no-reboot patching"
|
|
279
|
+
},
|
|
280
|
+
{
|
|
281
|
+
"date": "2026-05-01",
|
|
282
|
+
"type": "skill_review",
|
|
283
|
+
"artifact": "threat-model-currency",
|
|
284
|
+
"path": "skills/threat-model-currency/skill.md",
|
|
285
|
+
"note": "Score how current an org's threat model is against 2026 reality — 14-item checklist, currency percentage, prioritized update roadmap"
|
|
286
|
+
},
|
|
287
|
+
{
|
|
288
|
+
"date": "2026-05-01",
|
|
289
|
+
"type": "skill_review",
|
|
290
|
+
"artifact": "global-grc",
|
|
291
|
+
"path": "skills/global-grc/skill.md",
|
|
292
|
+
"note": "Multi-jurisdiction GRC mapping — EU (GDPR/NIS2/DORA/EU AI Act/CRA), UK, AU, SG, JP, IN, CA, ISO 27001:2022, CSA CCM v4"
|
|
293
|
+
},
|
|
294
|
+
{
|
|
295
|
+
"date": "2026-05-01",
|
|
296
|
+
"type": "skill_review",
|
|
297
|
+
"artifact": "zeroday-gap-learn",
|
|
298
|
+
"path": "skills/zeroday-gap-learn/skill.md",
|
|
299
|
+
"note": "Run the zero-day learning loop — CVE to attack vector to control gap to framework gap to new control requirement"
|
|
300
|
+
},
|
|
301
|
+
{
|
|
302
|
+
"date": "2026-05-01",
|
|
303
|
+
"type": "skill_review",
|
|
304
|
+
"artifact": "pqc-first",
|
|
305
|
+
"path": "skills/pqc-first/skill.md",
|
|
306
|
+
"note": "Post-quantum cryptography first mentality — hard version gates (OpenSSL 3.5+), algorithm sunset tracking, HNDL assessment, loopback learning for NIST/IETF evolution"
|
|
307
|
+
},
|
|
308
|
+
{
|
|
309
|
+
"date": "2026-05-01",
|
|
310
|
+
"type": "skill_review",
|
|
311
|
+
"artifact": "skill-update-loop",
|
|
312
|
+
"path": "skills/skill-update-loop/skill.md",
|
|
313
|
+
"note": "Meta-skill for keeping all exceptd skills current — CISA KEV triggers, ATLAS version updates, framework amendments, forward_watch resolution, currency scoring"
|
|
314
|
+
},
|
|
315
|
+
{
|
|
316
|
+
"date": "2026-05-01",
|
|
317
|
+
"type": "skill_review",
|
|
318
|
+
"artifact": "security-maturity-tiers",
|
|
319
|
+
"path": "skills/security-maturity-tiers/skill.md",
|
|
320
|
+
"note": "Three-tier implementation roadmap — MVP (ship this week), Practical (scalable today), Overkill (defense-in-depth)"
|
|
321
|
+
},
|
|
322
|
+
{
|
|
323
|
+
"date": "2026-05-01",
|
|
324
|
+
"type": "catalog_update",
|
|
325
|
+
"artifact": "data/atlas-ttps.json",
|
|
326
|
+
"path": "data/atlas-ttps.json",
|
|
327
|
+
"schema_version": "1.0.0",
|
|
328
|
+
"entry_count": 9
|
|
329
|
+
},
|
|
330
|
+
{
|
|
331
|
+
"date": "2026-05-01",
|
|
332
|
+
"type": "catalog_update",
|
|
333
|
+
"artifact": "data/exploit-availability.json",
|
|
334
|
+
"path": "data/exploit-availability.json",
|
|
335
|
+
"schema_version": "1.0.0",
|
|
336
|
+
"entry_count": 5
|
|
337
|
+
},
|
|
338
|
+
{
|
|
339
|
+
"date": "2026-05-01",
|
|
340
|
+
"type": "catalog_update",
|
|
341
|
+
"artifact": "data/framework-control-gaps.json",
|
|
342
|
+
"path": "data/framework-control-gaps.json",
|
|
343
|
+
"schema_version": "1.0.0",
|
|
344
|
+
"entry_count": 49
|
|
345
|
+
},
|
|
346
|
+
{
|
|
347
|
+
"date": "2026-05-01",
|
|
348
|
+
"type": "catalog_update",
|
|
349
|
+
"artifact": "data/zeroday-lessons.json",
|
|
350
|
+
"path": "data/zeroday-lessons.json",
|
|
351
|
+
"schema_version": "1.0.0",
|
|
352
|
+
"entry_count": 5
|
|
353
|
+
},
|
|
354
|
+
{
|
|
355
|
+
"date": "2026-05-01",
|
|
356
|
+
"type": "manifest_review",
|
|
357
|
+
"artifact": "manifest.json",
|
|
358
|
+
"path": "manifest.json",
|
|
359
|
+
"note": "manifest threat_review_date — 38 skills, 10 catalogs"
|
|
360
|
+
}
|
|
361
|
+
]
|
|
362
|
+
}
|
|
@@ -0,0 +1,229 @@
|
|
|
1
|
+
{
|
|
2
|
+
"_meta": {
|
|
3
|
+
"schema_version": "1.0.0",
|
|
4
|
+
"note": "Per-catalog compact summary so AI consumers can discover available data without loading every _meta block. Purpose strings are curated in scripts/builders/catalog-summaries.js.",
|
|
5
|
+
"catalog_count": 10
|
|
6
|
+
},
|
|
7
|
+
"catalogs": {
|
|
8
|
+
"atlas-ttps.json": {
|
|
9
|
+
"path": "data/atlas-ttps.json",
|
|
10
|
+
"purpose": "MITRE ATLAS TTPs (AML.T0xxx) cited by skills, with tactic, name, description. Pinned to ATLAS v5.1.0 (November 2025).",
|
|
11
|
+
"schema_version": "1.0.0",
|
|
12
|
+
"last_updated": "2026-05-01",
|
|
13
|
+
"tlp": "CLEAR",
|
|
14
|
+
"source_confidence_default": "A1",
|
|
15
|
+
"freshness_policy": {
|
|
16
|
+
"default_review_cadence_days": 90,
|
|
17
|
+
"stale_after_days": 180,
|
|
18
|
+
"rebuild_after_days": 365,
|
|
19
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
20
|
+
},
|
|
21
|
+
"entry_count": 9,
|
|
22
|
+
"sample_keys": [
|
|
23
|
+
"AML.T0043",
|
|
24
|
+
"AML.T0010",
|
|
25
|
+
"AML.T0016",
|
|
26
|
+
"AML.T0017",
|
|
27
|
+
"AML.T0018"
|
|
28
|
+
]
|
|
29
|
+
},
|
|
30
|
+
"cve-catalog.json": {
|
|
31
|
+
"path": "data/cve-catalog.json",
|
|
32
|
+
"purpose": "Per-CVE record (CVSS, EPSS, CISA KEV, RWEP, AI-discovery, vendor advisories, framework gaps, ATLAS/ATT&CK mappings). Cross-validated against NVD + CISA KEV + FIRST EPSS via validate-cves.",
|
|
33
|
+
"schema_version": "1.0.0",
|
|
34
|
+
"last_updated": "2026-05-11",
|
|
35
|
+
"tlp": "CLEAR",
|
|
36
|
+
"source_confidence_default": "A1",
|
|
37
|
+
"freshness_policy": {
|
|
38
|
+
"default_review_cadence_days": 90,
|
|
39
|
+
"stale_after_days": 180,
|
|
40
|
+
"rebuild_after_days": 365,
|
|
41
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
42
|
+
},
|
|
43
|
+
"entry_count": 5,
|
|
44
|
+
"sample_keys": [
|
|
45
|
+
"CVE-2026-31431",
|
|
46
|
+
"CVE-2026-43284",
|
|
47
|
+
"CVE-2026-43500",
|
|
48
|
+
"CVE-2025-53773",
|
|
49
|
+
"CVE-2026-30615"
|
|
50
|
+
]
|
|
51
|
+
},
|
|
52
|
+
"cwe-catalog.json": {
|
|
53
|
+
"path": "data/cwe-catalog.json",
|
|
54
|
+
"purpose": "MITRE CWE entries used by the project (subset with skill citations), with severity hint and category. Pinned to a CWE catalog version.",
|
|
55
|
+
"schema_version": "1.0.0",
|
|
56
|
+
"last_updated": "2026-05-11",
|
|
57
|
+
"tlp": "CLEAR",
|
|
58
|
+
"source_confidence_default": "A1",
|
|
59
|
+
"freshness_policy": {
|
|
60
|
+
"default_review_cadence_days": 90,
|
|
61
|
+
"stale_after_days": 180,
|
|
62
|
+
"rebuild_after_days": 365,
|
|
63
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
64
|
+
},
|
|
65
|
+
"entry_count": 34,
|
|
66
|
+
"sample_keys": [
|
|
67
|
+
"CWE-787",
|
|
68
|
+
"CWE-79",
|
|
69
|
+
"CWE-89",
|
|
70
|
+
"CWE-416",
|
|
71
|
+
"CWE-20"
|
|
72
|
+
]
|
|
73
|
+
},
|
|
74
|
+
"d3fend-catalog.json": {
|
|
75
|
+
"path": "data/d3fend-catalog.json",
|
|
76
|
+
"purpose": "MITRE D3FEND countermeasures (D3-xxx) keyed by id, with tactic + name. Pinned to D3FEND v1.0.0 release.",
|
|
77
|
+
"schema_version": "1.0.0",
|
|
78
|
+
"last_updated": "2026-05-11",
|
|
79
|
+
"tlp": "CLEAR",
|
|
80
|
+
"source_confidence_default": "A1",
|
|
81
|
+
"freshness_policy": {
|
|
82
|
+
"default_review_cadence_days": 90,
|
|
83
|
+
"stale_after_days": 180,
|
|
84
|
+
"rebuild_after_days": 365,
|
|
85
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
86
|
+
},
|
|
87
|
+
"entry_count": 20,
|
|
88
|
+
"sample_keys": [
|
|
89
|
+
"D3-EAL",
|
|
90
|
+
"D3-EHB",
|
|
91
|
+
"D3-PSEP",
|
|
92
|
+
"D3-ASLR",
|
|
93
|
+
"D3-SCP"
|
|
94
|
+
]
|
|
95
|
+
},
|
|
96
|
+
"dlp-controls.json": {
|
|
97
|
+
"path": "data/dlp-controls.json",
|
|
98
|
+
"purpose": "DLP control inventory: per-pattern definitions for the dlp-gap-analysis skill, jurisdiction-tagged so a deployment can scope by applicable laws.",
|
|
99
|
+
"schema_version": "1.0.0",
|
|
100
|
+
"last_updated": "2026-05-11",
|
|
101
|
+
"tlp": "CLEAR",
|
|
102
|
+
"source_confidence_default": "B2",
|
|
103
|
+
"freshness_policy": {
|
|
104
|
+
"default_review_cadence_days": 90,
|
|
105
|
+
"stale_after_days": 180,
|
|
106
|
+
"rebuild_after_days": 365,
|
|
107
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
108
|
+
},
|
|
109
|
+
"entry_count": 22,
|
|
110
|
+
"sample_keys": [
|
|
111
|
+
"DLP-CHAN-EMAIL-OUT",
|
|
112
|
+
"DLP-CHAN-WEB-UPLOAD",
|
|
113
|
+
"DLP-CHAN-USB-REMOVABLE",
|
|
114
|
+
"DLP-CHAN-LLM-PROMPT",
|
|
115
|
+
"DLP-CHAN-LLM-CONTEXT"
|
|
116
|
+
]
|
|
117
|
+
},
|
|
118
|
+
"exploit-availability.json": {
|
|
119
|
+
"path": "data/exploit-availability.json",
|
|
120
|
+
"purpose": "Per-CVE exploit availability: PoC public status, weaponization signal, AI-assist status, blast-radius. Project-curated (B2 Admiralty confidence) with source citations.",
|
|
121
|
+
"schema_version": "1.0.0",
|
|
122
|
+
"last_updated": "2026-05-01",
|
|
123
|
+
"tlp": "CLEAR",
|
|
124
|
+
"source_confidence_default": "B2",
|
|
125
|
+
"freshness_policy": {
|
|
126
|
+
"default_review_cadence_days": 90,
|
|
127
|
+
"stale_after_days": 180,
|
|
128
|
+
"rebuild_after_days": 365,
|
|
129
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
130
|
+
},
|
|
131
|
+
"entry_count": 5,
|
|
132
|
+
"sample_keys": [
|
|
133
|
+
"CVE-2026-31431",
|
|
134
|
+
"CVE-2026-43284",
|
|
135
|
+
"CVE-2026-43500",
|
|
136
|
+
"CVE-2025-53773",
|
|
137
|
+
"CVE-2026-30615"
|
|
138
|
+
]
|
|
139
|
+
},
|
|
140
|
+
"framework-control-gaps.json": {
|
|
141
|
+
"path": "data/framework-control-gaps.json",
|
|
142
|
+
"purpose": "Per-control framework gap declarations: SI-2, A.8.8, PCI 6.3.3, etc. Each entry names the control, the lag, the evidence CVE, and remediation guidance.",
|
|
143
|
+
"schema_version": "1.0.0",
|
|
144
|
+
"last_updated": "2026-05-01",
|
|
145
|
+
"tlp": "CLEAR",
|
|
146
|
+
"source_confidence_default": "A1",
|
|
147
|
+
"freshness_policy": {
|
|
148
|
+
"default_review_cadence_days": 90,
|
|
149
|
+
"stale_after_days": 180,
|
|
150
|
+
"rebuild_after_days": 365,
|
|
151
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
152
|
+
},
|
|
153
|
+
"entry_count": 49,
|
|
154
|
+
"sample_keys": [
|
|
155
|
+
"NIST-800-53-SI-2",
|
|
156
|
+
"NIST-800-53-SC-8",
|
|
157
|
+
"NIST-800-53-AC-2",
|
|
158
|
+
"NIST-800-53-SI-3",
|
|
159
|
+
"NIST-800-53-SA-12"
|
|
160
|
+
]
|
|
161
|
+
},
|
|
162
|
+
"global-frameworks.json": {
|
|
163
|
+
"path": "data/global-frameworks.json",
|
|
164
|
+
"purpose": "Multi-jurisdiction framework registry: 34 jurisdictions × applicable frameworks × patch_sla / notification_sla / critical_controls / framework_gaps. Cross-cutting authority for jurisdiction-clocks index.",
|
|
165
|
+
"schema_version": "1.3.0",
|
|
166
|
+
"last_updated": "2026-05-11",
|
|
167
|
+
"tlp": "CLEAR",
|
|
168
|
+
"source_confidence_default": "A1",
|
|
169
|
+
"freshness_policy": {
|
|
170
|
+
"default_review_cadence_days": 90,
|
|
171
|
+
"stale_after_days": 180,
|
|
172
|
+
"rebuild_after_days": 365,
|
|
173
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
174
|
+
},
|
|
175
|
+
"entry_count": 35,
|
|
176
|
+
"sample_keys": [
|
|
177
|
+
"EU",
|
|
178
|
+
"UK",
|
|
179
|
+
"AU",
|
|
180
|
+
"SG",
|
|
181
|
+
"JP"
|
|
182
|
+
]
|
|
183
|
+
},
|
|
184
|
+
"rfc-references.json": {
|
|
185
|
+
"path": "data/rfc-references.json",
|
|
186
|
+
"purpose": "IETF RFCs + active Internet-Drafts cited by skills (TLS, IPsec, PQ crypto migration, HTTP/3, CT). Cross-validated against IETF Datatracker via validate-rfcs.",
|
|
187
|
+
"schema_version": "1.0.0",
|
|
188
|
+
"last_updated": "2026-05-11",
|
|
189
|
+
"tlp": "CLEAR",
|
|
190
|
+
"source_confidence_default": "A1",
|
|
191
|
+
"freshness_policy": {
|
|
192
|
+
"default_review_cadence_days": 90,
|
|
193
|
+
"stale_after_days": 180,
|
|
194
|
+
"rebuild_after_days": 365,
|
|
195
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
196
|
+
},
|
|
197
|
+
"entry_count": 19,
|
|
198
|
+
"sample_keys": [
|
|
199
|
+
"RFC-8446",
|
|
200
|
+
"DRAFT-IETF-TLS-ECDHE-MLKEM",
|
|
201
|
+
"DRAFT-IETF-TLS-HYBRID-DESIGN",
|
|
202
|
+
"RFC-9180",
|
|
203
|
+
"RFC-9458"
|
|
204
|
+
]
|
|
205
|
+
},
|
|
206
|
+
"zeroday-lessons.json": {
|
|
207
|
+
"path": "data/zeroday-lessons.json",
|
|
208
|
+
"purpose": "Distilled lessons from notable zero-days and campaigns (SesameOp, Copy Fail, Dirty Frag, Copilot RCE, Windsurf MCP). Each entry: technique, distinguishing characteristic, what it means for the framework lag.",
|
|
209
|
+
"schema_version": "1.0.0",
|
|
210
|
+
"last_updated": "2026-05-01",
|
|
211
|
+
"tlp": "CLEAR",
|
|
212
|
+
"source_confidence_default": "B2",
|
|
213
|
+
"freshness_policy": {
|
|
214
|
+
"default_review_cadence_days": 90,
|
|
215
|
+
"stale_after_days": 180,
|
|
216
|
+
"rebuild_after_days": 365,
|
|
217
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
218
|
+
},
|
|
219
|
+
"entry_count": 5,
|
|
220
|
+
"sample_keys": [
|
|
221
|
+
"CVE-2026-31431",
|
|
222
|
+
"CVE-2025-53773",
|
|
223
|
+
"CVE-2026-43284",
|
|
224
|
+
"CVE-2026-43500",
|
|
225
|
+
"CVE-2026-30615"
|
|
226
|
+
]
|
|
227
|
+
}
|
|
228
|
+
}
|
|
229
|
+
}
|