@blamejs/exceptd-skills 0.9.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (136) hide show
  1. package/AGENTS.md +232 -0
  2. package/ARCHITECTURE.md +267 -0
  3. package/CHANGELOG.md +616 -0
  4. package/CONTEXT.md +203 -0
  5. package/LICENSE +200 -0
  6. package/NOTICE +82 -0
  7. package/README.md +307 -0
  8. package/SECURITY.md +73 -0
  9. package/agents/README.md +81 -0
  10. package/agents/report-generator.md +156 -0
  11. package/agents/skill-updater.md +102 -0
  12. package/agents/source-validator.md +119 -0
  13. package/agents/threat-researcher.md +149 -0
  14. package/bin/exceptd.js +183 -0
  15. package/data/_indexes/_meta.json +88 -0
  16. package/data/_indexes/activity-feed.json +362 -0
  17. package/data/_indexes/catalog-summaries.json +229 -0
  18. package/data/_indexes/chains.json +7135 -0
  19. package/data/_indexes/currency.json +359 -0
  20. package/data/_indexes/did-ladders.json +451 -0
  21. package/data/_indexes/frequency.json +2072 -0
  22. package/data/_indexes/handoff-dag.json +476 -0
  23. package/data/_indexes/jurisdiction-clocks.json +967 -0
  24. package/data/_indexes/jurisdiction-map.json +536 -0
  25. package/data/_indexes/recipes.json +319 -0
  26. package/data/_indexes/section-offsets.json +3656 -0
  27. package/data/_indexes/stale-content.json +14 -0
  28. package/data/_indexes/summary-cards.json +1736 -0
  29. package/data/_indexes/theater-fingerprints.json +381 -0
  30. package/data/_indexes/token-budget.json +2137 -0
  31. package/data/_indexes/trigger-table.json +1374 -0
  32. package/data/_indexes/xref.json +818 -0
  33. package/data/atlas-ttps.json +282 -0
  34. package/data/cve-catalog.json +496 -0
  35. package/data/cwe-catalog.json +1017 -0
  36. package/data/d3fend-catalog.json +738 -0
  37. package/data/dlp-controls.json +1039 -0
  38. package/data/exploit-availability.json +67 -0
  39. package/data/framework-control-gaps.json +1255 -0
  40. package/data/global-frameworks.json +2913 -0
  41. package/data/rfc-references.json +324 -0
  42. package/data/zeroday-lessons.json +377 -0
  43. package/keys/public.pem +3 -0
  44. package/lib/framework-gap.js +328 -0
  45. package/lib/job-queue.js +195 -0
  46. package/lib/lint-skills.js +536 -0
  47. package/lib/prefetch.js +372 -0
  48. package/lib/refresh-external.js +713 -0
  49. package/lib/schemas/cve-catalog.schema.json +151 -0
  50. package/lib/schemas/manifest.schema.json +106 -0
  51. package/lib/schemas/skill-frontmatter.schema.json +113 -0
  52. package/lib/scoring.js +149 -0
  53. package/lib/sign.js +197 -0
  54. package/lib/ttp-mapper.js +80 -0
  55. package/lib/validate-catalog-meta.js +198 -0
  56. package/lib/validate-cve-catalog.js +213 -0
  57. package/lib/validate-indexes.js +83 -0
  58. package/lib/validate-package.js +162 -0
  59. package/lib/validate-vendor.js +85 -0
  60. package/lib/verify.js +216 -0
  61. package/lib/worker-pool.js +84 -0
  62. package/manifest-snapshot.json +1833 -0
  63. package/manifest.json +2108 -0
  64. package/orchestrator/README.md +124 -0
  65. package/orchestrator/dispatcher.js +140 -0
  66. package/orchestrator/event-bus.js +146 -0
  67. package/orchestrator/index.js +874 -0
  68. package/orchestrator/pipeline.js +201 -0
  69. package/orchestrator/scanner.js +327 -0
  70. package/orchestrator/scheduler.js +137 -0
  71. package/package.json +113 -0
  72. package/sbom.cdx.json +158 -0
  73. package/scripts/audit-cross-skill.js +261 -0
  74. package/scripts/audit-perf.js +160 -0
  75. package/scripts/bootstrap.js +205 -0
  76. package/scripts/build-indexes.js +721 -0
  77. package/scripts/builders/activity-feed.js +79 -0
  78. package/scripts/builders/catalog-summaries.js +67 -0
  79. package/scripts/builders/currency.js +109 -0
  80. package/scripts/builders/cwe-chains.js +105 -0
  81. package/scripts/builders/did-ladders.js +149 -0
  82. package/scripts/builders/frequency.js +89 -0
  83. package/scripts/builders/jurisdiction-clocks.js +126 -0
  84. package/scripts/builders/recipes.js +159 -0
  85. package/scripts/builders/section-offsets.js +162 -0
  86. package/scripts/builders/stale-content.js +171 -0
  87. package/scripts/builders/summary-cards.js +166 -0
  88. package/scripts/builders/theater-fingerprints.js +198 -0
  89. package/scripts/builders/token-budget.js +96 -0
  90. package/scripts/check-manifest-snapshot.js +217 -0
  91. package/scripts/predeploy.js +267 -0
  92. package/scripts/refresh-manifest-snapshot.js +57 -0
  93. package/scripts/refresh-sbom.js +222 -0
  94. package/skills/age-gates-child-safety/skill.md +456 -0
  95. package/skills/ai-attack-surface/skill.md +282 -0
  96. package/skills/ai-c2-detection/skill.md +440 -0
  97. package/skills/ai-risk-management/skill.md +311 -0
  98. package/skills/api-security/skill.md +287 -0
  99. package/skills/attack-surface-pentest/skill.md +381 -0
  100. package/skills/cloud-security/skill.md +384 -0
  101. package/skills/compliance-theater/skill.md +365 -0
  102. package/skills/container-runtime-security/skill.md +379 -0
  103. package/skills/coordinated-vuln-disclosure/skill.md +473 -0
  104. package/skills/defensive-countermeasure-mapping/skill.md +300 -0
  105. package/skills/dlp-gap-analysis/skill.md +337 -0
  106. package/skills/email-security-anti-phishing/skill.md +206 -0
  107. package/skills/exploit-scoring/skill.md +331 -0
  108. package/skills/framework-gap-analysis/skill.md +374 -0
  109. package/skills/fuzz-testing-strategy/skill.md +313 -0
  110. package/skills/global-grc/skill.md +564 -0
  111. package/skills/identity-assurance/skill.md +272 -0
  112. package/skills/incident-response-playbook/skill.md +546 -0
  113. package/skills/kernel-lpe-triage/skill.md +303 -0
  114. package/skills/mcp-agent-trust/skill.md +326 -0
  115. package/skills/mlops-security/skill.md +325 -0
  116. package/skills/ot-ics-security/skill.md +340 -0
  117. package/skills/policy-exception-gen/skill.md +437 -0
  118. package/skills/pqc-first/skill.md +546 -0
  119. package/skills/rag-pipeline-security/skill.md +294 -0
  120. package/skills/researcher/skill.md +310 -0
  121. package/skills/sector-energy/skill.md +409 -0
  122. package/skills/sector-federal-government/skill.md +302 -0
  123. package/skills/sector-financial/skill.md +398 -0
  124. package/skills/sector-healthcare/skill.md +373 -0
  125. package/skills/security-maturity-tiers/skill.md +464 -0
  126. package/skills/skill-update-loop/skill.md +463 -0
  127. package/skills/supply-chain-integrity/skill.md +318 -0
  128. package/skills/threat-model-currency/skill.md +404 -0
  129. package/skills/threat-modeling-methodology/skill.md +312 -0
  130. package/skills/webapp-security/skill.md +281 -0
  131. package/skills/zeroday-gap-learn/skill.md +350 -0
  132. package/vendor/blamejs/LICENSE +201 -0
  133. package/vendor/blamejs/README.md +54 -0
  134. package/vendor/blamejs/_PROVENANCE.json +54 -0
  135. package/vendor/blamejs/retry.js +335 -0
  136. package/vendor/blamejs/worker-pool.js +418 -0
@@ -0,0 +1,473 @@
1
+ ---
2
+ name: coordinated-vuln-disclosure
3
+ version: "1.0.0"
4
+ description: Coordinated Vulnerability Disclosure for mid-2026 — ISO 29147 (disclosure) + ISO 30111 (handling) + VDP + bug bounty + CSAF 2.0 advisories + security.txt + EU CRA / NIS2 regulator-mandated disclosure + AI vulnerability classes
5
+ triggers:
6
+ - cvd
7
+ - coordinated vulnerability disclosure
8
+ - vdp
9
+ - vulnerability disclosure program
10
+ - bug bounty
11
+ - responsible disclosure
12
+ - iso 29147
13
+ - iso 30111
14
+ - csaf
15
+ - security.txt
16
+ - 90-day disclosure
17
+ - project zero
18
+ data_deps:
19
+ - cve-catalog.json
20
+ - atlas-ttps.json
21
+ - framework-control-gaps.json
22
+ - zeroday-lessons.json
23
+ - rfc-references.json
24
+ - cwe-catalog.json
25
+ - d3fend-catalog.json
26
+ atlas_refs: []
27
+ attack_refs: []
28
+ framework_gaps:
29
+ - NIST-800-218-SSDF
30
+ - ISO-27001-2022-A.8.8
31
+ - SOC2-CC9-vendor-management
32
+ rfc_refs: []
33
+ cwe_refs:
34
+ - CWE-1357
35
+ d3fend_refs: []
36
+ forward_watch:
37
+ - EU CRA Art. 11 implementing regulations and ENISA single-reporting-platform rollout (target operational 2026-09; first manufacturer notifications due 2027-12 per CRA transition timeline)
38
+ - ISO/IEC 29147 and ISO/IEC 30111 revisions expected post-CRA to align "method-neutral" language with EU 24h-notification reality
39
+ - CSAF 2.1 draft (CISA + OASIS working group) — VEX status profile extensions for AI/ML components and SBOM-aligned advisory shape
40
+ - Forthcoming IETF work on AI vulnerability disclosure (proposed BoF under SECDISPATCH) and any update to RFC 9116 (security.txt) covering AI/model artifact disclosure endpoints
41
+ - UK NCSC Vulnerability Disclosure Toolkit revisions and AU ISM CVD guidance updates
42
+ - NYDFS 23 NYCRR 500 amendments potentially adding explicit CVD program requirements
43
+ last_threat_review: "2026-05-11"
44
+ ---
45
+
46
+ # Coordinated Vulnerability Disclosure
47
+
48
+ Coordinated Vulnerability Disclosure (CVD) is the public-side mirror of the zero-day learning loop. `zeroday-gap-learn` consumes finished CVEs; `coordinated-vuln-disclosure` runs the upstream pipeline that turns a researcher's email, a bug-bounty report, or a regulator notification into a finished CVE with an advisory the rest of the ecosystem can act on. If the upstream pipeline is broken, the learning loop has nothing to learn from.
49
+
50
+ This skill operationalizes ISO/IEC 29147:2018 (Vulnerability disclosure), ISO/IEC 30111:2019 (Vulnerability handling processes), and the post-2024 layer of regulator-mandated CVD (EU CRA Art. 11, NIS2 Art. 12, NYDFS 500.17 incident-reporting overlap), plus the publication layer that downstream consumers actually parse (CSAF 2.0 advisories, security.txt per RFC 9116, CVE Records). It also handles the dimension that the ISO standards predate: AI vulnerabilities — model-weight tampering, training-data poisoning, prompt-injection classes — most of which do not fit the versioned-software shape that 29147/30111 assume.
51
+
52
+ ---
53
+
54
+ ## Threat Context (mid-2026)
55
+
56
+ CVD is no longer optional, and "we have a security@ alias" is no longer a program.
57
+
58
+ - **EU CRA Article 11** (Cyber Resilience Act, in force since December 2024; manufacturer obligations triggering through 2027) requires every manufacturer placing a product with digital elements on the EU market to operate a CVD process and to notify ENISA and the relevant CSIRT of any *actively exploited vulnerability* within **24 hours** of awareness (early warning), followed by an intermediate report within 72 hours and a final report within 14 days. ENISA's single reporting platform is rolling out 2026-2027; manufacturers without a wired-in CVD pipeline will miss the 24h clock at scale.
59
+ - **NIS2 Directive Article 12** mandates EU-wide coordinated vulnerability disclosure with a designated CSIRT acting as coordinator and requires Member States to operate a single point of contact. National implementations vary in maturity but the obligation is binding on essential and important entities from late 2024.
60
+ - **NYDFS 23 NYCRR 500.17** (covered entities in NY financial services) requires 72-hour notification for cybersecurity events, which intersects CVD when a disclosed vulnerability becomes a confirmed exploitation. The mapping between "received a researcher report" and "covered cybersecurity event" is ambiguous and most covered entities have not wired it.
61
+ - **US**: CISA Binding Operational Directive 20-01 requires federal agencies to publish a VDP; the broader voluntary CISA VDP guidance, the 2021 Executive Order 14028, and NIST 800-218 SSDF v1.1 (PW.4/PS.3/RV.1) push CVD into procurement. UK NCSC publishes a Vulnerability Disclosure Toolkit; AU ISM has CVD guidance in the OFFICIAL/PROTECTED tiers; JP IPA runs the early-warning partnership with JPCERT/CC; SG CSA publishes a Coordinated Vulnerability Disclosure framework; IL INCD operates a national CVD program; the EU's ENISA CSIRTs Network coordinates cross-border.
62
+ - **The AI dimension breaks the ISO model.** Anthropic publishes a responsible disclosure policy for Claude (prompt injection, jailbreaks, harmful-output regressions), OpenAI runs a bug bounty for ChatGPT, Microsoft runs an AI bug bounty including Copilot. None of these fit the ISO 29147/30111 assumption that a vulnerability has: (a) a versioned product, (b) a discrete patch shipped at a release boundary, (c) a CVE-shaped advisory. Model-weight vulnerabilities ship as serving-side weight updates without a CVE. Training-data poisoning has no patch — it has a re-training cycle. Prompt-injection classes (per `ai-attack-surface` and `rag-pipeline-security`) are class-level architectural facts, not bugs. The industry has no consensus on how to advertise these, score them, or notify regulators about them.
63
+ - **Disclosure cadence is the new CVSS.** Google Project Zero's 90-day-then-disclose policy, CISA's KEV-time disclosure, EU CRA's 24h-clock — each pushes exploit availability earlier in the lifecycle. A CVD program that runs on quarterly engineering cycles is structurally incompatible with the 24h regulatory clock; a CVD program with no intake page (no security.txt, no published policy) does not exist by the EU CRA definition.
64
+
65
+ The mid-2026 reality: CVD is now infrastructure, not paperwork. An org without a wired CVD pipeline is non-compliant with EU CRA, blind to its own zero-day learning loop, and a single tweet away from a public disclosure with no internal triage clock running.
66
+
67
+ ---
68
+
69
+ ## Framework Lag Declaration
70
+
71
+ CVD obligations now span four layers — process (ISO 29147/30111), software development (NIST SSDF), governance (SOC 2 vendor management, ISO 27001 vulnerability management), and regulator-mandated reporting (EU CRA, NIS2, NYDFS). Each layer is partially covered; none is sufficient alone.
72
+
73
+ | Framework / Jurisdiction | Control | What It Says | Why It Fails as a CVD Program Spec |
74
+ |---|---|---|---|
75
+ | ISO/IEC 29147:2018 | Vulnerability disclosure | Method-neutral guidance on receiving reports, coordinating fixes, publishing advisories. | Predates EU CRA 24h clock, predates AI vulnerabilities, predates CSAF 2.0. "Coordinate disclosure timeline" with no specified clock is incompatible with the 24h regulatory clock. |
76
+ | ISO/IEC 30111:2019 | Vulnerability handling processes | Internal handling lifecycle (triage, root cause, remediation). | Same lag: no AI-vuln class, no live-patch concept, no bug-bounty operations guidance, no regulator-notification step. |
77
+ | NIST 800-218 SSDF v1.1 | RV.1 (Identify and confirm vulnerabilities) + RV.2 (Assess, prioritize, and remediate) | Producers must receive and act on vulnerability reports. | Per `framework-control-gaps.json` NIST-800-218-SSDF: AI-generated code provenance and model-level vulnerability reports (jailbreaks, prompt-injection regressions, embedding inversion) are not treated on equal footing with code CVEs in PW.4 / PS.3 / RV.1. SSDF is silent on bug-bounty operations, CSAF publication, or regulator-notification clocks. |
78
+ | ISO/IEC 27001:2022 | A.8.8 Technical vulnerability management | "Information about technical vulnerabilities shall be obtained, the organization's exposure evaluated, and appropriate measures taken." | Per `framework-control-gaps.json` ISO-27001-2022-A.8.8: "appropriate measures" and "appropriate timescales" are undefined. The control does not require an external-facing CVD intake, does not require CSAF publication, does not require regulator notification, and is silent on AI vulnerability classes. |
79
+ | SOC 2 | CC9.2 Vendor management / CC7 (System operations — incident management) | Trust services criteria for vendor risk and incident handling. | Per `framework-control-gaps.json` SOC2-CC9-vendor-management: CC9.2 evaluates vendor controls at procurement-time but does not require evidence of vendor CVD program existence (security.txt, published policy, bug bounty), does not require continuous re-evaluation of vendor disclosure performance, and ignores AI-vendor model-weight disclosure entirely. |
80
+ | EU Cyber Resilience Act (Regulation 2024/2847) | Art. 11 — vulnerability handling and reporting | 24h early warning to ENISA/CSIRT for actively exploited vulnerabilities; 72h intermediate; 14d final. Manufacturer CVD process required. Annex I §2 lists vulnerability handling as essential requirement. | The legal obligation is concrete but the operationalization is left to the manufacturer. No prescribed advisory format (CSAF 2.0 is recommended, not mandated). The 24h clock is incompatible with quarterly release cycles. AI products are in scope as "products with digital elements"; the regulation does not yet resolve how model-weight vulnerabilities are reported. |
81
+ | EU NIS2 Directive (Directive 2022/2555) | Art. 12 — coordinated vulnerability disclosure; Art. 21 — risk management | Member States designate a CSIRT as CVD coordinator. Essential/important entities must operate CVD. | Member State implementations vary; coordinator-of-coordinators problem unsolved. Essential entities running legacy ISO 29147 programs without CSAF/security.txt are formally compliant but operationally invisible. |
82
+ | EU AI Act (Regulation 2024/1689) | Art. 73 — serious incident reporting (high-risk AI) | Providers of high-risk AI systems must report serious incidents to market surveillance authorities. | Defines "serious incident" but not "AI vulnerability." Overlap with CRA Art. 11 is unresolved — a single jailbreak in a high-risk AI system may need to be reported under both, on different clocks, to different authorities. |
83
+ | UK NCSC | Vulnerability Disclosure Toolkit | Practical CVD program guidance for UK orgs. | Guidance, not requirement. UK Product Security and Telecommunications Infrastructure Act (PSTI, 2022) requires security update policy publication for consumer connectable products but does not require a full CVD program. |
84
+ | AU ISM (OFFICIAL/PROTECTED) | ISM-1616 (vulnerability disclosure program) | Government entities should operate a CVD program. | "Should" not "must" at OFFICIAL; tighter at PROTECTED. Does not specify CSAF, does not specify AI-vuln handling. AU SOCI Act 2018 reporting (12h significant cyber incident) interacts with CVD when disclosure produces a confirmed compromise. |
85
+ | JP IPA / JPCERT/CC | Information Security Early Warning Partnership | National coordination scheme for product vulnerability disclosure. | Voluntary partnership, not regulatory mandate. Strong for traditional software vendors, weak for AI/SaaS where there is no product-version boundary. |
86
+ | SG CSA | Coordinated Vulnerability Disclosure Framework | National CVD framework for Singapore. | Voluntary. SG Cybersecurity Act 2018 (CCoP for CII operators) requires incident reporting but does not specify CVD program structure. |
87
+ | IL INCD | National CVD program | National coordinator. | National-scope coordinator. Defence-sector orgs operate under separate classified processes. |
88
+ | NYDFS 23 NYCRR 500.17 | Cybersecurity event notification | 72h notification of cybersecurity events to NYDFS. | Notification-only, not a CVD program spec. The intersection with CVD — "we received a researcher report; is that a cybersecurity event?" — is unresolved in practice. Covered entities without an explicit decision tree default to under-reporting. |
89
+
90
+ Cross-cutting gap: **no framework treats AI vulnerability disclosure as a first-class category**. ISO 29147/30111, SSDF, ISO 27001, SOC 2, and the regulator regimes all assume versioned-software shape. Model-weight tampering, training-data poisoning, prompt-injection classes, and embedding-space attacks have no native disclosure shape across any of the above. The org-level workaround is to extend the CVD program scope explicitly; the framework-level fix is pending.
91
+
92
+ ---
93
+
94
+ ## TTP Mapping
95
+
96
+ This skill is meta — it is the upstream input pipeline that feeds the downstream CVE catalog. It does not pin to specific TTPs. Frontmatter `atlas_refs` and `attack_refs` are intentionally empty.
97
+
98
+ | Input / Output Catalog | Role in the CVD Pipeline |
99
+ |---|---|
100
+ | `data/cve-catalog.json` | **Downstream product.** Every CVE in this catalog is the output of a CVD process (someone's, somewhere). When this org receives a report covering one of its own products, the resulting CVE enters this catalog via the same schema. |
101
+ | `data/zeroday-lessons.json` | **Downstream consumer.** Every disclosed CVE feeds the zero-day learning loop run by `zeroday-gap-learn`. A CVD program with no entries here is not learning from its own disclosures. |
102
+ | `data/atlas-ttps.json` (MITRE ATLAS v5.1.0) | **Lookup for AI-class disclosures.** When a report covers an AI vulnerability, map the attack mechanism to an ATLAS TTP (e.g., AML.T0051 LLM Prompt Injection, AML.T0096 LLM Plugin Compromise) for advisory tagging. |
103
+ | `data/framework-control-gaps.json` | **Lookup for regulator-notification routing.** Each disclosure intersects one or more framework controls; this skill writes new gaps when a disclosure exposes one. |
104
+ | `data/cwe-catalog.json` | **Required taxonomy for advisories.** Per CVE-Numbering-Authority practice, every CVE advisory cites a CWE. `CWE-1357 Reliance on Insufficiently Trustworthy Component` is invoked for supply-chain disclosures (MCP servers, AI dependencies); other CWEs per the specific class. |
105
+ | `data/d3fend-catalog.json` | **Defensive mapping for advisory recommendations.** Advisories that recommend mitigations should cite D3FEND IDs so blue teams can map the recommendation to existing control surfaces. See Defensive Countermeasure Mapping section. |
106
+ | `data/rfc-references.json` | **Lookup for protocol-related disclosures.** RFC 9116 (security.txt) is the publication endpoint for CVD intake; it is not currently in `data/rfc-references.json` (cited in prose throughout this skill). The catalog is consulted when a disclosure concerns an RFC-defined protocol (IPsec, TLS, etc.). |
107
+
108
+ Per `framework-gap-analysis` and `compliance-theater`: a CVD program that exists on paper but produces zero entries in `data/cve-catalog.json` (or its org-internal equivalent) is a process artifact without learning output.
109
+
110
+ ---
111
+
112
+ ## Exploit Availability Matrix
113
+
114
+ Unlike technical-vulnerability skills, the "availability" question for CVD is about disclosure cadence — how the choice of disclosure clock affects exploit weaponization speed downstream.
115
+
116
+ | Disclosure Model | Clock | Effect on Exploit Availability | When It Fits | When It Breaks |
117
+ |---|---|---|---|---|
118
+ | Google Project Zero | 90 days from vendor notification; +14 day grace; **0-day disclosure for actively exploited bugs** | Forces patch availability within 90 days; weaponization typically follows within 7-30 days of disclosure | High-volume vendor with mature CVD; researcher leverage needed | Small vendor / open-source maintainer overwhelmed by 90-day clock; AI vendors without versioned releases |
119
+ | CISA KEV-time | Disclosure aligned with KEV listing (active exploitation already confirmed) | Exploit availability is *prior* — disclosure is catching up to reality. RWEP spikes immediately. | Confirmed-exploited CVEs (e.g., CVE-2026-31431 Copy Fail) | Pre-exploitation vulnerabilities; class-level AI findings |
120
+ | EU CRA Art. 11 | **24h early warning** to ENISA for actively exploited; 72h intermediate; 14d final | Earliest formal regulator notification clock currently in force globally. Limits weaponization-vs-detection asymmetry. | EU manufacturers in scope; products with digital elements | Non-EU vendors not yet wired into ENISA platform; AI vendors with non-versioned products |
121
+ | NIS2 Art. 12 (per Member State CSIRT) | Coordinator-mediated; clock varies | Slower than CRA but broader scope (essential / important entities). | Member State entities | Cross-border coordination friction; coordinator-of-coordinators problem |
122
+ | NYDFS 500.17 | 72h | Notification-only; no public advisory implied | NY-licensed financial services | Pre-confirmation reports; AI/SaaS vendor incidents |
123
+ | ISO 29147 default | "Coordinate" — no specific clock | Researcher and vendor negotiate. Historically months to years. | Mature vendor + cooperative researcher | Public PoC drops mid-coordination; CRA-regulated products (clock incompatible) |
124
+ | Bug bounty (HackerOne / Bugcrowd / Intigriti / Anthropic / OpenAI / Microsoft AI) | Per program — typically 90-180d resolution SLA | Incentivized pre-disclosure pipeline. Weaponization deferred while researchers prioritize bounty payout over public disclosure. | Vendors with funded program; well-scoped attack surface | Critical bugs that exceed bounty ceiling; AI class-level findings that don't fit "specific bug" reward shape |
125
+ | AI-vendor responsible disclosure (Anthropic / OpenAI / Microsoft / Google / Meta) | Per program — no industry standard | Disclosure → model-update or serving-update, often **without a CVE or versioned advisory** | Prompt-injection, jailbreak, harmful-output regressions | Customers and regulators who expect CSAF/CVE-shaped output get a blog post instead |
126
+
127
+ For AI vulnerabilities specifically, the lifecycle is structurally different from software:
128
+ - A "patch" is a model retraining or a serving-side update — often without a version identifier the customer can pin.
129
+ - A "vulnerability" may be class-level (an entire prompt-injection technique applicable to a family of models) rather than instance-level.
130
+ - A "user" of the AI may be a deploying organization rather than an end user, complicating advisory routing.
131
+ - Disclosure of prompt-injection class techniques may itself enable copycat exploitation against other AI vendors — the disclosure-as-weaponization asymmetry is amplified.
132
+
133
+ Translation: the disclosure-clock choice is itself a security decision with downstream RWEP consequences. See `exploit-scoring` for RWEP scoring of disclosed CVEs.
134
+
135
+ ---
136
+
137
+ ## Analysis Procedure
138
+
139
+ Before stepping through the disclosure-program assessment, thread the three foundational design principles per AGENTS.md Skill File Format requirements:
140
+
141
+ **Defense in depth — disclosure intake as multi-layer pipeline.** A CVD program is not one channel; it is a stack:
142
+ - **Layer 1 — public VDP intake**: security.txt (RFC 9116), `/security` web page, published policy, public security@ alias. The minimum visible surface; tested by every script-kiddie scanner before they email the CEO.
143
+ - **Layer 2 — incentivized bug bounty**: HackerOne / Bugcrowd / Intigriti / Anthropic / OpenAI / Microsoft program. Pays researchers to come to you instead of dropping on Twitter or selling on a broker market.
144
+ - **Layer 3 — internal security testing including fuzz**: hand off to `fuzz-testing-strategy`. Continuous fuzzing (OSS-Fuzz, syzkaller, libfuzzer, AI-assisted fuzz harnesses) finds bugs before researchers do; failure to run this layer is a precondition for the bug bounty being overwhelmed.
145
+ - **Layer 4 — third-party pen testing and red-team exercises**: hand off to `attack-surface-pentest`. TIBER-EU style scope, periodic, deliberately targeting the assets the VDP/bounty does not attract researchers to.
146
+ - **Layer 5 — customer-driven CVE reports and regulator-routed reports**: ENISA single platform, national CSIRT routing under NIS2 Art. 12, NYDFS notifications, customer enterprise-security teams reporting via account managers.
147
+
148
+ An org that runs only one layer is brittle. The brittleness pattern: bug bounty without VDP (no public intake for non-bounty-scope reports), VDP without bug bounty (no incentive for high-skill researchers), bounty + VDP without internal fuzzing (third-party finds dominate; signal-to-noise ratio in intake collapses), internal testing only (researchers go elsewhere or sell).
149
+
150
+ **Least privilege — triage scope is per-report, not org-wide.** Researcher communications channel through a single security@ alias or VDP intake; reproducer assets stored with sealed access; not every engineer needs full pipeline access. The triage role sees all reports; product engineers see only their product's reports; regulator-notification authority is held by a named officer per CRA Art. 11 / NIS2 Art. 12 / NYDFS 500.17. Researchers receive scoped acknowledgment, not internal product detail. Bug-bounty platform admin scope is held by the security team, not engineering managers.
151
+
152
+ **Zero trust — assume every disclosure is real until proven otherwise.** Do not dismiss researchers based on report writing quality, reputation, or claimed affiliation. Reproduce in isolated environment (D3-RPA — Remote Process Analysis). Treat the researcher's reproducer as adversarial input — it may itself contain payloads targeting the triage environment. Verify reproducer behavior in a sandbox before broad internal distribution. Do not trust the report's classification or severity claim — re-score under RWEP independently (hand-off to `exploit-scoring`). Do not assume the researcher's disclosure window will hold without explicit written agreement.
153
+
154
+ Then run the program assessment steps:
155
+
156
+ ### Step 1 — Public intake surface (the "do you exist as a CVD target" check)
157
+
158
+ Test the externally visible CVD surface:
159
+ - Fetch `https://<domain>/.well-known/security.txt`. RFC 9116 requires `Contact`, `Expires` (must be in the future; many orgs let this lapse), and recommends `Encryption`, `Policy`, `Acknowledgments`, `Preferred-Languages`, `Canonical`. Without a valid security.txt, the org is not discoverable as a CVD target — an EU-CRA-regulated manufacturer in this state is in early non-compliance.
160
+ - Test the `Contact:` channel — does email to it route to a triaged queue? Does it auto-respond with an acknowledgment SLA?
161
+ - Fetch the linked `Policy:` URL — does it match an ISO 29147-shaped policy (scope, safe harbor, response times, coordination expectations, public-acknowledgment terms)?
162
+ - Verify `Encryption:` URL serves a current PGP key (or modern equivalent — age, signify) if encrypted intake is offered.
163
+
164
+ ### Step 2 — Policy content (the ISO 29147 conformance check)
165
+
166
+ Audit the published CVD policy:
167
+ - **Scope**: what products/services/AI systems are in scope? Out-of-scope assets named?
168
+ - **Safe harbor**: explicit good-faith research authorization. Without it, researchers may decline to report or take legal precautions that delay disclosure.
169
+ - **Submission expectations**: report shape, reproducer expectations, communication channel.
170
+ - **Vendor response SLAs**: initial acknowledgment (target 24-72h), validation (target 5-10 days), remediation timeline (severity-banded), public disclosure timing.
171
+ - **Coordination preferences**: disclosure-deadline policy (90-day default? CRA Art. 11 24h for actively exploited?), credit/acknowledgment terms, embargo expectations.
172
+ - **Out-of-scope behaviors**: social engineering employees, physical attacks, DoS, etc.
173
+ - **AI-system handling**: explicit scope statement for model behavior, prompt-injection classes, training-data concerns, RAG corpus issues — or explicit statement that the policy does not cover these (preferable to silent ambiguity).
174
+
175
+ ### Step 3 — Handling lifecycle (the ISO 30111 conformance check)
176
+
177
+ Walk the internal handling pipeline:
178
+ - **Intake → triage**: how does a report move from VDP queue to product team? Is there a SLA? Is there a named owner per product?
179
+ - **Validation**: who reproduces? In what isolated environment (D3-RPA)? What is the false-positive rate?
180
+ - **Severity scoring**: CVSS for legacy compatibility, RWEP per `lib/scoring.js` for actual prioritization. Per AGENTS.md DR-2: CVSS-only scoring fails.
181
+ - **Remediation routing**: how does a confirmed vulnerability become a fix? What is the engineering SLA per RWEP band?
182
+ - **Verification**: how is the fix confirmed? Researcher re-verification? Internal regression test?
183
+ - **Disclosure preparation**: who drafts the advisory? Who approves? When does CVE assignment happen (request from CVE.org or via a CNA partner)?
184
+
185
+ ### Step 4 — Regulator-notification wiring (the EU CRA / NIS2 / NYDFS check)
186
+
187
+ For each in-scope jurisdiction, verify the notification pipeline:
188
+ - **EU CRA Art. 11** (manufacturer in scope): is there a 24h-clock-aware process? Who is the named notification officer? Is there a direct channel to ENISA / national CSIRT? Is the CRA "actively exploited" criterion operationalized — what triggers the clock?
189
+ - **EU NIS2 Art. 12** (essential / important entity in scope): which national CSIRT is the designated CVD coordinator? What is the routing? Cross-border coordination plan?
190
+ - **EU AI Act Art. 73** (high-risk AI system provider): serious-incident reporting to market surveillance authority. How does this interact with CRA Art. 11 reporting? Same officer? Same clock?
191
+ - **NYDFS 500.17** (covered NY financial entity): 72h cybersecurity event notification. Decision tree: when does a received vulnerability report cross into "cybersecurity event" requiring notification?
192
+ - **AU SOCI Act** (critical infrastructure): 12h significant cyber incident notification — does an exploited disclosure trigger this?
193
+ - **UK NCSC reporting**, **SG CSA reporting**, **JP IPA early-warning partnership**, **IL INCD coordination**: per-jurisdiction routing checked.
194
+
195
+ ### Step 5 — Bug bounty operations (the incentive-layer check)
196
+
197
+ Audit the bounty program (if operated):
198
+ - **Platform**: HackerOne / Bugcrowd / Intigriti / self-hosted? Anthropic / OpenAI / Microsoft AI bounty for AI vendors.
199
+ - **Scope clarity**: which assets in scope; out-of-scope explicit. AI-vendor: which models, which surfaces (chat UI, API, plugins/MCP, fine-tuning, embeddings).
200
+ - **Severity → payout matrix**: aligned with RWEP, not CVSS alone.
201
+ - **Response SLAs**: triage time, payout time, resolution time. Public metrics?
202
+ - **Duplicate handling, signal-to-noise ratio**.
203
+ - **AI-class submissions**: how are prompt-injection / jailbreak / harmful-output regressions / training-data findings rewarded? Most programs under-pay class-level findings versus single bugs; the structural incentive misalignment pushes class-level AI findings into the academic-paper pipeline instead of the bounty pipeline.
204
+
205
+ ### Step 6 — Learning-loop integration (the `zeroday-gap-learn` hand-off)
206
+
207
+ For every disclosed vulnerability against an org product:
208
+ - Per AGENTS.md DR-8: the CVE entry in `data/cve-catalog.json` triggers a corresponding entry in `data/zeroday-lessons.json`.
209
+ - The CVD program is the source of these entries. If the CVD program is operating but learning-loop entries are not being produced, the hand-off is broken.
210
+ - The internal control gap exposed by each disclosure is the input to `framework-gap-analysis` — is the org's own framework coverage missing this control class?
211
+
212
+ ### Step 7 — Advisory publication (the CSAF 2.0 / VEX check)
213
+
214
+ For each disclosed vulnerability, verify advisory output:
215
+ - **CSAF 2.0 advisory** (OASIS CSAF v2.0, published 2022; CSAF 2.1 draft in flight 2026): machine-readable advisory in JSON form, published at `/.well-known/csaf/`. Per AGENTS.md global-first rule, CSAF is the de facto cross-jurisdiction format — CISA, ENISA, BSI, NCSC-NL all consume it.
216
+ - **VEX statement** (Vulnerability Exploitability eXchange, CSAF profile): per-product exploitability status. Hand off to `supply-chain-integrity` for SBOM-aligned VEX integration.
217
+ - **CVE Record**: filed via CNA (or via CVE.org if no CNA partner). CVE ID assignment timing matters for regulator-notification (CRA Art. 11 references a specific vulnerability identifier).
218
+ - **Plain-language advisory**: customer-facing version. Translation of CSAF/VEX into operator action.
219
+ - **AI-vendor advisory equivalent**: where the disclosure does not fit CSAF/CVE shape (model-weight class, prompt-injection class), publish a structured advisory using the org's documented AI-vuln-advisory format — and acknowledge in the policy that this format is non-standard.
220
+
221
+ ### Step 8 — Disclosure timeline operations
222
+
223
+ Operate the disclosure clock per the agreed model:
224
+ - **Active-exploitation case**: CRA Art. 11 24h-clock starts at awareness. Notification pipeline runs in parallel with internal triage.
225
+ - **Pre-exploitation case**: standard ISO 29147 coordination clock. Default 90-day disclosure unless researcher and vendor agree otherwise.
226
+ - **Researcher disclosure-window enforcement**: if the researcher will disclose at day 90 regardless, advisory must be ready at day 89. Vendor cannot extend unilaterally.
227
+ - **Embargo break handling**: if disclosure leaks (researcher tweet, broker market, public PoC drop), pivot to immediate-disclosure mode and notify regulators if exploitation evidence emerges.
228
+
229
+ ### Step 9 — Acknowledgment and credit
230
+
231
+ - Hall-of-fame / acknowledgments page per RFC 9116 `Acknowledgments:` field.
232
+ - Researcher credit in advisory, CVE Record, CSAF document `acknowledgments` block.
233
+ - Bug-bounty platform payout reconciled with public credit.
234
+
235
+ ### Step 10 — Program metrics and continuous improvement
236
+
237
+ Per ISO 30111 §5 (continual improvement) and NIST 800-218 SSDF RV.2 (assess, prioritize, remediate):
238
+ - Time-to-acknowledge, time-to-validate, time-to-fix (banded by severity / RWEP).
239
+ - Disclosure-to-CVE-publication latency.
240
+ - Researcher-satisfaction signal (re-disclosure rate, public researcher feedback).
241
+ - Regulator-notification on-time rate (24h / 72h / 14d milestones for CRA; 72h for NYDFS; per-jurisdiction).
242
+ - Class-level findings vs instance-level findings (AI-vendor relevance).
243
+ - Hand off to `framework-gap-analysis` whenever metrics show a control class repeatedly absent from intake.
244
+
245
+ **Ephemeral / serverless / AI-pipeline reality (per AGENTS.md rule #9):** CVD is largely org-process, not infrastructure, so the "is this control architecturally possible in a serverless / AI-pipeline environment" question does not apply in the usual sense. The honest version of the question for THIS skill is: **does your AI / agent pipeline have CVD scope?** Most orgs running production agentic systems do not. The org has a CVD policy covering its web application, its API, and its enterprise software — and silently excludes the LangChain orchestrator, the RAG corpus, the agent toolchain, the MCP-server installations, the model-serving infrastructure, and the fine-tuning pipeline. That silent exclusion is the gap. The fix is to make scope explicit in the published policy: list AI/agent assets in scope or list them as explicitly out-of-scope. Silence is not a posture.
246
+
247
+ ---
248
+
249
+ ## Output Format
250
+
251
+ The skill produces seven artifacts per program assessment:
252
+
253
+ ### 1. CVD Policy Text (ISO 29147 template)
254
+
255
+ ```
256
+ # Coordinated Vulnerability Disclosure Policy — <Organization>
257
+
258
+ ## Scope
259
+ In scope: <list of products / services / AI systems>
260
+ Out of scope: <list of assets / behaviors>
261
+ AI-systems statement: <explicit scope for model behavior, prompt-injection classes,
262
+ training-data, RAG corpora, agent toolchains — or explicit exclusion>
263
+
264
+ ## Safe Harbor
265
+ We will not pursue legal action for security research conducted in good faith
266
+ within the scope and rules below. Specifically: ...
267
+
268
+ ## How to Report
269
+ Contact: security@<domain> (also see /.well-known/security.txt)
270
+ Encrypted reports: <PGP fingerprint / age recipient>
271
+ Bug bounty: <platform URL if any>
272
+
273
+ ## Vendor Response SLAs
274
+ Acknowledgment: within <24 / 48 / 72>h
275
+ Initial validation: within <5 / 10> business days
276
+ Remediation target (RWEP-banded): RWEP 90+ <4h–7d>; 70–89 <30d>; 40–69 <90d>; <40 <next release>
277
+ Public disclosure: <90 days> by default; <24h regulator notification> for actively exploited
278
+
279
+ ## Coordination Preferences
280
+ Disclosure deadline: 90 days (extensions by mutual agreement)
281
+ Embargo: <terms>
282
+ Credit / acknowledgment: <terms; opt-in / opt-out>
283
+
284
+ ## Out of Scope Behavior
285
+ Social engineering of employees, physical attacks, denial of service, …
286
+
287
+ ## Regulator-Notification Statement
288
+ EU CRA Art. 11: actively-exploited vulnerabilities will be reported to ENISA
289
+ within 24 hours of confirmation. Where customer notification overlaps with
290
+ regulator notification, we will coordinate timing with affected customers
291
+ where feasible without delaying the regulatory clock.
292
+ ```
293
+
294
+ ### 2. Bug Bounty Scope Document
295
+
296
+ ```
297
+ # Bug Bounty — <Organization> — Scope
298
+
299
+ In-scope assets:
300
+ - <domain1> + subdomains
301
+ - <product-API endpoint>
302
+ - <AI system> — surfaces: chat UI, API, plugins/MCP, fine-tuning, embeddings
303
+ - <mobile app bundle IDs>
304
+
305
+ Out of scope:
306
+ - Marketing sites, third-party SaaS, social engineering, physical, DoS
307
+
308
+ Severity → payout matrix (USD):
309
+ RWEP 90+ Critical: $<X>
310
+ RWEP 70–89 High: $<X>
311
+ RWEP 40–69 Medium: $<X>
312
+ RWEP <40 Low: $<X>
313
+ AI class-level finding (prompt-injection class / training-data class):
314
+ $<X> — flat-rate for class-level discovery regardless of instance count
315
+
316
+ Duplicate handling: first valid report wins; subsequent dupes get a goodwill credit.
317
+ AI / model-weight reports: see additional handling in policy.
318
+ ```
319
+
320
+ ### 3. security.txt Content (RFC 9116)
321
+
322
+ ```
323
+ Contact: mailto:security@<domain>
324
+ Contact: https://<domain>/.well-known/security-report
325
+ Expires: <ISO date — keep at least 12 months in the future; renew quarterly>
326
+ Encryption: https://<domain>/security.asc
327
+ Acknowledgments: https://<domain>/security/hall-of-fame
328
+ Preferred-Languages: en, <others>
329
+ Canonical: https://<domain>/.well-known/security.txt
330
+ Policy: https://<domain>/security/policy
331
+ Hiring: https://<domain>/security/jobs
332
+ ```
333
+
334
+ ### 4. CSAF 2.0 Advisory Skeleton
335
+
336
+ ```json
337
+ {
338
+ "document": {
339
+ "category": "csaf_security_advisory",
340
+ "csaf_version": "2.0",
341
+ "publisher": {
342
+ "category": "vendor",
343
+ "name": "<Organization>",
344
+ "namespace": "https://<domain>"
345
+ },
346
+ "title": "<Advisory title>",
347
+ "tracking": {
348
+ "id": "<vendor-advisory-id>",
349
+ "initial_release_date": "<ISO timestamp>",
350
+ "current_release_date": "<ISO timestamp>",
351
+ "status": "final",
352
+ "version": "1.0",
353
+ "revision_history": []
354
+ },
355
+ "distribution": { "tlp": { "label": "WHITE" } }
356
+ },
357
+ "product_tree": { "branches": [] },
358
+ "vulnerabilities": [
359
+ {
360
+ "cve": "CVE-YYYY-NNNNN",
361
+ "cwe": { "id": "CWE-1357", "name": "Reliance on Insufficiently Trustworthy Component" },
362
+ "scores": [{ "cvss_v3": {}, "products": [] }],
363
+ "remediations": [],
364
+ "acknowledgments": [{ "names": ["<researcher>"], "organization": "<affiliation>" }]
365
+ }
366
+ ]
367
+ }
368
+ ```
369
+
370
+ VEX status profile fields (per CSAF VEX profile): `product_status.known_affected`, `known_not_affected`, `fixed`, `under_investigation` — populated per product variant.
371
+
372
+ ### 5. EU CRA / NIS2 Regulator-Notification Template
373
+
374
+ ```
375
+ TO: <ENISA single reporting platform> AND <Member State CSIRT>
376
+ SUBJECT: CRA Art. 11 Early Warning — <vendor> — <advisory-id>
377
+ TIMESTAMP: <ISO timestamp, <24h from awareness>
378
+
379
+ 1. Manufacturer identity: <name, address, contact, EU representative if applicable>
380
+ 2. Product affected: <name, versions, CPE if available>
381
+ 3. Vulnerability summary: <2-3 sentences, no exploitation detail>
382
+ 4. Awareness timestamp: <when did manufacturer become aware>
383
+ 5. Active exploitation evidence: <basis for "actively exploited" determination>
384
+ 6. Affected user population estimate: <count or range>
385
+ 7. Mitigation status: <available / in development / not yet available>
386
+ 8. Coordination point of contact: <named officer, email, phone>
387
+ 9. Next milestone: 72h intermediate report at <ISO timestamp>
388
+ ```
389
+
390
+ For NYDFS 500.17 / AU SOCI / UK / SG / JP / IL: parallel templates per jurisdiction; the same disclosure event may trigger several in parallel.
391
+
392
+ ### 6. Intake-to-Disclosure Timeline Tracker
393
+
394
+ | Phase | Event | Target SLA | Actual | Owner |
395
+ |---|---|---|---|---|
396
+ | T+0 | Report received via VDP / bounty / direct | — | — | Triage |
397
+ | T+24h | Acknowledgment sent to reporter | 24h | — | Triage |
398
+ | T+5d | Validation complete; RWEP scored | 5d | — | Product + Security |
399
+ | T+24h (parallel, if exploited) | EU CRA Art. 11 early warning sent | 24h from awareness | — | Named officer |
400
+ | T+72h (parallel, if exploited) | Intermediate regulator report | 72h | — | Named officer |
401
+ | T+30d (RWEP-banded) | Patch shipped | per band | — | Engineering |
402
+ | T+14d (parallel, if exploited) | Final regulator report | 14d | — | Named officer |
403
+ | T+disclosure-day | CSAF advisory published; CVE record live; researcher acknowledged | per agreed window | — | Security + Comms |
404
+ | T+disclosure+1d | Entry filed in `data/zeroday-lessons.json` per AGENTS.md DR-8 | 1d | — | Security |
405
+
406
+ ### 7. Program Metrics Report
407
+
408
+ ```
409
+ Window: <Q-N>
410
+ Reports received: <N>
411
+ Median time-to-acknowledge: <Xh>
412
+ Median time-to-validate: <Xd>
413
+ Median time-to-fix (RWEP 90+): <Xh / Xd>
414
+ Disclosure-to-CVE-publication latency: <Xd>
415
+ EU CRA Art. 11 24h on-time rate: <X%>
416
+ NIS2 / NYDFS / SOCI / IL / SG / JP / UK on-time rate per jurisdiction: <X%>
417
+ AI class-level findings: <N> (flat-rate paid: <$X>)
418
+ Hall-of-fame entries added: <N>
419
+ zeroday-lessons.json entries filed: <N>
420
+ framework-control-gaps.json entries added or updated: <N>
421
+ ```
422
+
423
+ ---
424
+
425
+ ## Compliance Theater Check
426
+
427
+ Four concrete tests distinguish a real CVD program from CVD theater. Run them in order — each filters out a tier of paper compliance.
428
+
429
+ > **Test 1 — Publish your security.txt URL right now.** Fetch `https://<domain>/.well-known/security.txt`. If it 404s, the org has no public CVD intake — which means no compliance with EU CRA Art. 11 (manufacturers must operate a CVD process; "operate" requires discoverability), no NIS2 Art. 12 coordinator wiring, no RFC 9116 conformance, and the next researcher who finds something will email the CEO or drop on social media. The org will discover this when a Reuters reporter calls. If security.txt exists but `Expires:` is in the past, the org once had a program and stopped operating it — same outcome, with the additional signal that internal ownership has lapsed.
430
+
431
+ > **Test 2 — Show me your last 12 months of received disclosures and time-to-fix per severity band.** If the answer is "we don't track that," there is no program — only a queue. If the answer is "we track it, here are the numbers," compare time-to-fix against RWEP bands: median time-to-fix for RWEP 90+ must be measured in hours-to-days, not weeks. CVSS-banded SLAs alone are insufficient (per AGENTS.md DR-2). If the org cannot produce metrics, the org cannot demonstrate continuous improvement per ISO 30111 §5 or NIST 800-218 RV.2, so the formal compliance with those controls is theater regardless of policy text.
432
+
433
+ > **Test 3 — Show me a single CSAF 2.0 advisory you've published, with a CVE ID, in the last 12 months.** If the answer is "we publish blog posts" or "we wait for the CVE to appear in NVD" or "our security advisories are PDF attachments," downstream consumers (customers, regulators, automated patch-management systems) cannot ingest the disclosures. The org's disclosure posture is theater for the machine-readable era. Under EU CRA Art. 11, the advisory format is left to the manufacturer but consumers and regulators are converging on CSAF 2.0; an org that has never published one is not operating in the de facto downstream ecosystem.
434
+
435
+ > **Test 4 — What is your AI vulnerability disclosure handling?** Three failure modes signal theater: (a) "same as software CVEs" — the org has not engaged with the class-level reality and the lack of versioned-patch shape; (b) "we don't run AI systems" — verify against actual product surface (most orgs do, often via embedded Copilot / Claude / ChatGPT integrations, RAG features, internal agentic workflows); (c) "we have a separate process but it's not published" — the published policy must state AI scope or explicitly exclude it. Silence is the failure. If the org operates a high-risk AI system under EU AI Act Art. 73 with no serious-incident notification pipeline, that is a regulatory failure on top of the disclosure-posture failure.
436
+
437
+ A program passing all four tests is operating CVD as infrastructure. A program failing any one is operating CVD as paperwork — and the next disclosure will expose the gap publicly.
438
+
439
+ ---
440
+
441
+ ## Defensive Countermeasure Mapping
442
+
443
+ Per AGENTS.md Skill File Format optional 8th section (required for skills shipped on or after 2026-05-11): map this skill's findings to MITRE D3FEND IDs from `data/d3fend-catalog.json` with explicit defense-in-depth layer position, least-privilege scope, zero-trust posture, and AI-pipeline applicability.
444
+
445
+ CVD is process infrastructure, not a single technical control — the D3FEND mapping is therefore thin and concentrated at the triage and post-disclosure boundaries.
446
+
447
+ | D3FEND ID | Where It Applies in CVD | Defense-in-Depth Layer | Least-Privilege Scope | Zero-Trust Posture | AI-Pipeline Applicability |
448
+ |---|---|---|---|---|---|
449
+ | **D3-RPA** (Remote Process Analysis) | Reproducer execution and triage. Researcher-submitted reproducers are adversarial input; execute in isolated environment with telemetry. | Triage layer (between intake and validation). | Triage analysts only; product engineers receive reproduced findings, not raw researcher payloads. | Verify reproducer behavior in sandbox; do not trust the report's classification or the researcher's environment claims. | Applies — AI-vuln reproducers (jailbreak prompts, training-data poisoning payloads) must run in isolated model-serving environments. The reproducer prompt may itself be designed to exfiltrate triage-environment data. |
450
+ | **D3-NTA** (Network Traffic Analysis) | Post-disclosure exploitation monitoring. Once an advisory ships, attacker weaponization typically follows within days; egress monitoring detects active exploitation against unpatched customers. | Detection layer (post-disclosure, downstream of CVD output). | Detection scoped to known exploit indicators from disclosed CVE; not all-traffic surveillance. | Assume disclosed CVEs will be exploited; verify exploitation evidence per advisory IOCs. | Limited direct applicability — AI exploitation traffic often blends with legitimate AI API usage (see `ai-c2-detection`); D3-NTA on its own is insufficient. |
451
+ | **D3-EAL** (Executable Allowlisting) | Post-disclosure blocking of known weaponized exploits. When a public PoC ships with the advisory, allowlisting blocks the exploit binary class from execution on patched/unpatched endpoints alike. | Prevention layer (post-disclosure, downstream of CVD output). | Endpoint scope; allowlist administered by endpoint-security team, not application teams. | Default-deny; verify executable signatures and allowlist membership per execution. | Limited — AI exploits are typically prompt-class, not binary-class. D3-EAL applies to traditional-software exploits derived from CVD output, not AI-class disclosures. |
452
+
453
+ **Explicit statement per AGENTS.md rule #4 (no orphaned controls)**: CVD itself is process infrastructure. The technical defensive layers it *feeds* are the D3FEND techniques above plus the broader cross-walk in `defensive-countermeasure-mapping`. A CVD program with no downstream defensive-control hand-off is producing advisories that no operator action follows — which is the post-disclosure equivalent of compliance theater.
454
+
455
+ **AI-pipeline statement per AGENTS.md rule #9**: D3FEND's current coverage of AI-vulnerability defenses is sparse. Mid-2026 D3FEND additions (per `data/d3fend-catalog.json` forward-watch) are extending into AI-system telemetry; the gap until then is filled by `ai-attack-surface`, `rag-pipeline-security`, and `ai-c2-detection` skill-specific recommendations.
456
+
457
+ Reference `defensive-countermeasure-mapping` for the full cross-walk; reference `framework-gap-analysis` for the regulatory-control gaps each defensive layer leaves open.
458
+
459
+ ---
460
+
461
+ ## Hand-Off / Related Skills
462
+
463
+ CVD sits at the upstream end of several skill pipelines. Route to the following on the indicated trigger:
464
+
465
+ - **`zeroday-gap-learn`** — *downstream consumer of CVD reports.* Every disclosed CVE against an org product triggers a learning-loop entry per AGENTS.md DR-8. If CVD output is not producing `data/zeroday-lessons.json` entries, the hand-off is broken. Run `zeroday-gap-learn` for every advisory shipped.
466
+ - **`exploit-scoring`** — *RWEP scoring of disclosed CVEs.* CVSS alone is insufficient per AGENTS.md DR-2; route every confirmed-validated disclosure through RWEP scoring before regulator notification (the "actively exploited" determination depends on it).
467
+ - **`supply-chain-integrity`** — *CSAF VEX integration with SBOM.* When the disclosure affects a product component shipped to downstream consumers, the CSAF advisory's VEX status profile must align with the SBOM produced under SLSA / CycloneDX / SPDX. Hand off for the supply-chain-shaped output.
468
+ - **`framework-gap-analysis`** — *CVD failures often expose framework gaps.* When a disclosure shows that an existing control (SI-2, A.8.8, CC9.2, SSDF RV.1) was insufficient to prevent or detect the vulnerability, file the gap under the appropriate framework entry per `data/framework-control-gaps.json`.
469
+ - **`compliance-theater`** — *publish-no-VDP theater test.* The four compliance theater checks in this skill compose with the broader theater detection across frameworks; run `compliance-theater` after this skill when the org is claiming SOC 2 / ISO 27001 / NIST CSF maturity that the CVD test results contradict.
470
+ - **`fuzz-testing-strategy`** — *Layer 3 of defense-in-depth.* Continuous fuzzing pre-empts external disclosure; weak fuzzing makes the bug-bounty intake overwhelmed by findings the org should have found internally.
471
+ - **`attack-surface-pentest`** — *Layer 4 of defense-in-depth.* TIBER-EU-style red team exercises target the assets that VDP/bounty does not attract researchers to.
472
+ - **`defensive-countermeasure-mapping`** — *full D3FEND cross-walk* beyond the three IDs cited in the Defensive Countermeasure Mapping section above.
473
+ - **`global-grc`** — *cross-jurisdiction routing* when the disclosure intersects multiple regulator regimes (EU CRA + NIS2 + AI Act + NYDFS + AU SOCI + IL INCD + SG CSA + JP IPA + UK NCSC), which is the common case for multi-jurisdictional organizations.