@blamejs/exceptd-skills 0.9.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (136) hide show
  1. package/AGENTS.md +232 -0
  2. package/ARCHITECTURE.md +267 -0
  3. package/CHANGELOG.md +616 -0
  4. package/CONTEXT.md +203 -0
  5. package/LICENSE +200 -0
  6. package/NOTICE +82 -0
  7. package/README.md +307 -0
  8. package/SECURITY.md +73 -0
  9. package/agents/README.md +81 -0
  10. package/agents/report-generator.md +156 -0
  11. package/agents/skill-updater.md +102 -0
  12. package/agents/source-validator.md +119 -0
  13. package/agents/threat-researcher.md +149 -0
  14. package/bin/exceptd.js +183 -0
  15. package/data/_indexes/_meta.json +88 -0
  16. package/data/_indexes/activity-feed.json +362 -0
  17. package/data/_indexes/catalog-summaries.json +229 -0
  18. package/data/_indexes/chains.json +7135 -0
  19. package/data/_indexes/currency.json +359 -0
  20. package/data/_indexes/did-ladders.json +451 -0
  21. package/data/_indexes/frequency.json +2072 -0
  22. package/data/_indexes/handoff-dag.json +476 -0
  23. package/data/_indexes/jurisdiction-clocks.json +967 -0
  24. package/data/_indexes/jurisdiction-map.json +536 -0
  25. package/data/_indexes/recipes.json +319 -0
  26. package/data/_indexes/section-offsets.json +3656 -0
  27. package/data/_indexes/stale-content.json +14 -0
  28. package/data/_indexes/summary-cards.json +1736 -0
  29. package/data/_indexes/theater-fingerprints.json +381 -0
  30. package/data/_indexes/token-budget.json +2137 -0
  31. package/data/_indexes/trigger-table.json +1374 -0
  32. package/data/_indexes/xref.json +818 -0
  33. package/data/atlas-ttps.json +282 -0
  34. package/data/cve-catalog.json +496 -0
  35. package/data/cwe-catalog.json +1017 -0
  36. package/data/d3fend-catalog.json +738 -0
  37. package/data/dlp-controls.json +1039 -0
  38. package/data/exploit-availability.json +67 -0
  39. package/data/framework-control-gaps.json +1255 -0
  40. package/data/global-frameworks.json +2913 -0
  41. package/data/rfc-references.json +324 -0
  42. package/data/zeroday-lessons.json +377 -0
  43. package/keys/public.pem +3 -0
  44. package/lib/framework-gap.js +328 -0
  45. package/lib/job-queue.js +195 -0
  46. package/lib/lint-skills.js +536 -0
  47. package/lib/prefetch.js +372 -0
  48. package/lib/refresh-external.js +713 -0
  49. package/lib/schemas/cve-catalog.schema.json +151 -0
  50. package/lib/schemas/manifest.schema.json +106 -0
  51. package/lib/schemas/skill-frontmatter.schema.json +113 -0
  52. package/lib/scoring.js +149 -0
  53. package/lib/sign.js +197 -0
  54. package/lib/ttp-mapper.js +80 -0
  55. package/lib/validate-catalog-meta.js +198 -0
  56. package/lib/validate-cve-catalog.js +213 -0
  57. package/lib/validate-indexes.js +83 -0
  58. package/lib/validate-package.js +162 -0
  59. package/lib/validate-vendor.js +85 -0
  60. package/lib/verify.js +216 -0
  61. package/lib/worker-pool.js +84 -0
  62. package/manifest-snapshot.json +1833 -0
  63. package/manifest.json +2108 -0
  64. package/orchestrator/README.md +124 -0
  65. package/orchestrator/dispatcher.js +140 -0
  66. package/orchestrator/event-bus.js +146 -0
  67. package/orchestrator/index.js +874 -0
  68. package/orchestrator/pipeline.js +201 -0
  69. package/orchestrator/scanner.js +327 -0
  70. package/orchestrator/scheduler.js +137 -0
  71. package/package.json +113 -0
  72. package/sbom.cdx.json +158 -0
  73. package/scripts/audit-cross-skill.js +261 -0
  74. package/scripts/audit-perf.js +160 -0
  75. package/scripts/bootstrap.js +205 -0
  76. package/scripts/build-indexes.js +721 -0
  77. package/scripts/builders/activity-feed.js +79 -0
  78. package/scripts/builders/catalog-summaries.js +67 -0
  79. package/scripts/builders/currency.js +109 -0
  80. package/scripts/builders/cwe-chains.js +105 -0
  81. package/scripts/builders/did-ladders.js +149 -0
  82. package/scripts/builders/frequency.js +89 -0
  83. package/scripts/builders/jurisdiction-clocks.js +126 -0
  84. package/scripts/builders/recipes.js +159 -0
  85. package/scripts/builders/section-offsets.js +162 -0
  86. package/scripts/builders/stale-content.js +171 -0
  87. package/scripts/builders/summary-cards.js +166 -0
  88. package/scripts/builders/theater-fingerprints.js +198 -0
  89. package/scripts/builders/token-budget.js +96 -0
  90. package/scripts/check-manifest-snapshot.js +217 -0
  91. package/scripts/predeploy.js +267 -0
  92. package/scripts/refresh-manifest-snapshot.js +57 -0
  93. package/scripts/refresh-sbom.js +222 -0
  94. package/skills/age-gates-child-safety/skill.md +456 -0
  95. package/skills/ai-attack-surface/skill.md +282 -0
  96. package/skills/ai-c2-detection/skill.md +440 -0
  97. package/skills/ai-risk-management/skill.md +311 -0
  98. package/skills/api-security/skill.md +287 -0
  99. package/skills/attack-surface-pentest/skill.md +381 -0
  100. package/skills/cloud-security/skill.md +384 -0
  101. package/skills/compliance-theater/skill.md +365 -0
  102. package/skills/container-runtime-security/skill.md +379 -0
  103. package/skills/coordinated-vuln-disclosure/skill.md +473 -0
  104. package/skills/defensive-countermeasure-mapping/skill.md +300 -0
  105. package/skills/dlp-gap-analysis/skill.md +337 -0
  106. package/skills/email-security-anti-phishing/skill.md +206 -0
  107. package/skills/exploit-scoring/skill.md +331 -0
  108. package/skills/framework-gap-analysis/skill.md +374 -0
  109. package/skills/fuzz-testing-strategy/skill.md +313 -0
  110. package/skills/global-grc/skill.md +564 -0
  111. package/skills/identity-assurance/skill.md +272 -0
  112. package/skills/incident-response-playbook/skill.md +546 -0
  113. package/skills/kernel-lpe-triage/skill.md +303 -0
  114. package/skills/mcp-agent-trust/skill.md +326 -0
  115. package/skills/mlops-security/skill.md +325 -0
  116. package/skills/ot-ics-security/skill.md +340 -0
  117. package/skills/policy-exception-gen/skill.md +437 -0
  118. package/skills/pqc-first/skill.md +546 -0
  119. package/skills/rag-pipeline-security/skill.md +294 -0
  120. package/skills/researcher/skill.md +310 -0
  121. package/skills/sector-energy/skill.md +409 -0
  122. package/skills/sector-federal-government/skill.md +302 -0
  123. package/skills/sector-financial/skill.md +398 -0
  124. package/skills/sector-healthcare/skill.md +373 -0
  125. package/skills/security-maturity-tiers/skill.md +464 -0
  126. package/skills/skill-update-loop/skill.md +463 -0
  127. package/skills/supply-chain-integrity/skill.md +318 -0
  128. package/skills/threat-model-currency/skill.md +404 -0
  129. package/skills/threat-modeling-methodology/skill.md +312 -0
  130. package/skills/webapp-security/skill.md +281 -0
  131. package/skills/zeroday-gap-learn/skill.md +350 -0
  132. package/vendor/blamejs/LICENSE +201 -0
  133. package/vendor/blamejs/README.md +54 -0
  134. package/vendor/blamejs/_PROVENANCE.json +54 -0
  135. package/vendor/blamejs/retry.js +335 -0
  136. package/vendor/blamejs/worker-pool.js +418 -0
@@ -0,0 +1,313 @@
1
+ ---
2
+ name: fuzz-testing-strategy
3
+ version: "1.0.0"
4
+ description: Continuous fuzzing as a security control — coverage-guided fuzz (AFL++/libFuzzer), AI-assisted fuzz, OSS-Fuzz integration, kernel fuzz (syzkaller), AI-API fuzz, integration into CI/CD as compliance evidence
5
+ triggers:
6
+ - fuzz testing
7
+ - fuzzing
8
+ - oss-fuzz
9
+ - syzkaller
10
+ - libfuzzer
11
+ - afl
12
+ - coverage-guided fuzz
13
+ - ai-assisted fuzz
14
+ - continuous fuzz
15
+ - prompt fuzz
16
+ - api fuzz
17
+ data_deps:
18
+ - cve-catalog.json
19
+ - atlas-ttps.json
20
+ - framework-control-gaps.json
21
+ - cwe-catalog.json
22
+ - d3fend-catalog.json
23
+ atlas_refs:
24
+ - AML.T0043
25
+ attack_refs:
26
+ - T1190
27
+ framework_gaps:
28
+ - NIST-800-218-SSDF
29
+ - NIST-800-115
30
+ - OWASP-ASVS-v5.0-V14
31
+ rfc_refs: []
32
+ cwe_refs:
33
+ - CWE-125
34
+ - CWE-20
35
+ - CWE-362
36
+ - CWE-416
37
+ - CWE-78
38
+ - CWE-787
39
+ forward_watch:
40
+ - NIST SP 800-218A (AI-specific SSDF practices) for any explicit fuzz requirement on model-serving stacks
41
+ - OpenSSF Scorecard "fuzzing" check threshold evolution
42
+ - syzkaller eBPF and io_uring surface expansion as new kernel attack surfaces ship
43
+ - OSS-Fuzz-Gen / AI-assisted harness generation becoming the default expectation for OSS maintainers
44
+ d3fend_refs:
45
+ - D3-EAL
46
+ - D3-IOPR
47
+ - D3-PSEP
48
+ last_threat_review: "2026-05-11"
49
+ ---
50
+
51
+ # Fuzz Testing Strategy
52
+
53
+ Continuous fuzzing is a security control, not a QA activity. This skill treats fuzz presence, coverage, and SDLC integration the same way patch management treats SI-2: as an operational requirement whose absence is a finding.
54
+
55
+ ---
56
+
57
+ ## Threat Context (mid-2026)
58
+
59
+ By mid-2026 the asymmetry between offensive and defensive fuzzing has flipped. The defender's question is no longer "should we fuzz?" — it is "are we fuzzing as fast as attackers are fuzzing us?"
60
+
61
+ - **AI-assisted fuzz campaigns produce real-world CVEs on weekly cadence.** Copy Fail (CVE-2026-31431, CVSS 7.8 / RWEP 90, CISA KEV) was discovered by an AI-system-driven fuzz campaign in approximately one hour against a kernel surface that humans had fuzzed for years (`data/cve-catalog.json`). The Linux page-cache copy-on-write path had been a syzkaller target since 2018. What broke was not the technique — it was the harness-generation cost. AI lifted that cost to near-zero.
62
+ - **AI harness generation is the new force multiplier.** Microsoft's AIM (AI-augmented fuzzing internal program), Google's OSS-Fuzz-Gen pipeline (LLM-generated harnesses scaled across the OSS-Fuzz corpus), and academic systems including TitanFuzz / Fuzz4All / WhiteFox produce semantically valid inputs and target-specific harnesses that classical coverage-guided fuzzers (AFL++/libFuzzer) cannot reach without expert authoring. The expert-authoring bottleneck was the single biggest gate on fuzz coverage for a decade. That gate is gone for attackers.
63
+ - **OSS-Fuzz is now table-stakes infrastructure, not a research curiosity.** OSS-Fuzz exceeded 1,000 onboarded projects in 2024 and has produced more than 10,000 reproducible bug reports across its lifetime. By 2026, OpenSSF Scorecard penalizes any C/C++/Rust dependency whose upstream is not enrolled in OSS-Fuzz or equivalent continuous fuzz infrastructure. Vendor risk assessments increasingly require evidence of upstream fuzz coverage.
64
+ - **Kernel and parser surfaces remain the highest-yield targets.** syzkaller has produced more than 5,000 Linux kernel bugs since 2016. By mid-2026 io_uring, eBPF verifier, and netfilter remain the top-yielding surfaces, with the page-cache subsystem newly added after Copy Fail. Userspace parsers (image, video, font, archive, protocol) continue to yield memory-safety CVEs at the rate of dozens per month across the OSS-Fuzz corpus.
65
+ - **AI / LLM surfaces are now first-class fuzz targets.** PromptBench (LLM input robustness), garak (vulnerability scanner for LLM systems), and NVIDIA NeMo Guardrails red-team harnesses run prompt-fuzz campaigns mapping to AML.T0043 (Craft Adversarial Data) and feed adversarial-input findings back into model serving stacks. By mid-2026 any production LLM-fronted application without continuous prompt fuzz is exposed to attacker-class adversarial generation.
66
+ - **The compliance gap is operational, not theoretical.** No framework requires fuzz as a control (see Framework Lag Declaration). The result: an org can be NIST 800-218 SSDF-compliant on paper while shipping parser code that has never been fuzzed. That gap is what this skill exists to surface.
67
+
68
+ ---
69
+
70
+ ## Framework Lag Declaration
71
+
72
+ | Framework | Control | What It Assumes | Why It Fails (mid-2026) |
73
+ |---|---|---|---|
74
+ | NIST SP 800-218 SSDF v1.1 | PW.7 (Review and/or Analyze Human-Readable Code), PW.8 (Test Executable Code to Identify Vulnerabilities) | "Use appropriate testing techniques" including fuzz is mentioned in informative references, not normative requirements | PW.8 lists fuzzing in NIST 800-53 mapping informatively. There is no normative requirement that fuzz harnesses exist, that they run continuously, or that uncovered code is treated as a finding. An org with zero fuzz harnesses can claim SSDF conformance. |
75
+ | NIST SP 800-115 (2008) | §4 Technical Assessment Techniques | Point-in-time penetration testing methodology written before coverage-guided fuzz was mainstream | Predates AFL (2013), libFuzzer (2015), OSS-Fuzz (2016), syzkaller (2015). No continuous-fuzz concept. No AI-assisted-harness concept. Treats fuzz as an optional technique alongside scanners. Cited by FedRAMP and DoD assessments where its absence of fuzz requirements becomes the auditable baseline. |
76
+ | NIST 800-53 Rev 5 | SA-11 (Developer Testing and Evaluation), SA-11(8) (Dynamic Code Analysis) | Developer "performs dynamic code analysis"; control enhancement (8) names fuzz as an example | Method-agnostic. A vendor running quarterly licensed-scanner runs against a staging URL can claim SA-11 conformance. No requirement for coverage-guided fuzz, no requirement for continuous operation, no requirement that uncovered branches be tracked. |
77
+ | OWASP ASVS v5.0 | V14 (Configuration), V10 (Coding) | Application security verification across configuration and malicious-code controls | Neither V14 nor V10 requires fuzz harnesses for parsers, deserializers, or IPC surfaces. ASVS L3 (highest) does not mandate continuous fuzz. An L3-verified app can ship a hand-written XML parser that has never been fuzzed. |
78
+ | PCI DSS 4.0 | 6.2 (custom software developed securely), 11.3 (vulnerability testing) | "Vulnerability testing" operationalized as authenticated and unauthenticated scans | PCI 6.2.4 lists "fuzz testing" as one of several "industry-accepted methods" of testing for "common software attacks" — but does not require it. An assessor will accept SAST + DAST + scanner output as conformance. No continuous-fuzz requirement, no coverage threshold. |
79
+ | ISO 27001:2022 | A.8.29 (Security testing in development and acceptance) | "Security testing processes shall be defined" — method-agnostic | The standard is deliberately method-agnostic. An org can document "we run a SAST scanner quarterly" and pass A.8.29 audit. No fuzz, no coverage measurement, no AI-augmented testing required. |
80
+ | EU NIS2 Directive | Art. 21(2)(e) — "policies and procedures to assess the effectiveness of cybersecurity risk-management measures" | Essential and important entities must test the effectiveness of their risk-management measures | "Test the effectiveness" is undefined at the technique level. National implementations (e.g., Germany BSI, Italy ACN) do not operationalize fuzz as a required measure. An entity can pass Art. 21 audit with scanner-only testing. |
81
+ | EU Cyber Resilience Act (CRA) | Annex I §1(2)(b), §2 | Products with digital elements must "deliver security updates" and be "designed, developed, produced to ensure an appropriate level of cybersecurity" | The CRA's "appropriate level" language has no technique floor. Annex I requires vulnerability testing but does not mandate fuzz. Conformance assessment under the harmonized standards (in draft as of mid-2026) is unlikely to mandate continuous fuzz before publication. |
82
+ | UK NCSC CAF (Cyber Assessment Framework) v3.2 | Principle B4 (System Security), Objective B4.b (Secure Configuration) | OES / RDP entities must "secure their networked systems and data" | CAF B4 is outcome-focused. No technique-level fuzz requirement. CAF Indicators of Good Practice (IGPs) mention "rigorous testing" without operationalizing fuzz. |
83
+ | Australia ASD Essential 8 | Application Control (ML1–ML3), Patch Applications (ML1–ML3) | Pre-execution control of binaries; rapid patching of known vulns | Essential 8 is post-disclosure. No pre-disclosure-via-fuzz requirement. The ASD ISM control 1235 (development) is method-agnostic, identical failure mode to ISO A.8.29. |
84
+ | EU AI Act | Art. 15 (Accuracy, robustness and cybersecurity for high-risk AI) | High-risk AI systems must "achieve an appropriate level of accuracy, robustness and cybersecurity" and be "resilient against attempts by unauthorised third parties to alter their use, outputs or performance" | Robustness is operationalized in the draft harmonized standards as "adversarial robustness testing" — but does not mandate continuous prompt-fuzz, does not name PromptBench / garak / equivalent, and provides no coverage metric. An obligor can ship an LLM-fronted product with zero adversarial-input fuzz and claim Art. 15 conformance via point-in-time red-team evidence. |
85
+
86
+ **Cross-framework conclusion:** No major framework (NIST, ISO, PCI, OWASP, NIS2, CRA, CAF, Essential 8, EU AI Act) mandates continuous fuzz as a required security control for products with parser, IPC, native-code, or LLM surfaces. Fuzz appears in informative references and example lists. The framework lag is uniform.
87
+
88
+ ---
89
+
90
+ ## TTP Mapping (MITRE ATLAS v5.1.0 + MITRE ATT&CK Enterprise)
91
+
92
+ Fuzz is a pre-exploit control: it surfaces weaknesses before they leave the build pipeline. Mapping is via the weakness root cause (CWE) rather than the post-exploit technique.
93
+
94
+ | Surface | Pre-exploit TTP (what fuzz prevents) | Root CWE | Gap Flag |
95
+ |---|---|---|---|
96
+ | Native code parsers (image, archive, protocol, font) | T1190 (Exploit Public-Facing Application — prerequisite weakness class) | CWE-787 (Out-of-bounds Write), CWE-416 (Use After Free) | NIST 800-218 PW.8 informative-only; no normative requirement that parser code be fuzzed |
97
+ | Input validation across all external interfaces | T1190 (prerequisite) | CWE-20 (Improper Input Validation) | OWASP ASVS V5 (input validation) requires checks, not fuzz to verify checks survive adversarial input |
98
+ | Command construction in shells, exec wrappers, MCP tool surfaces | T1190 (prerequisite); pre-T1059 (Command and Scripting Interpreter) at trust boundaries | CWE-78 (OS Command Injection) | Static rules in SAST routinely miss runtime command construction; only fuzz with command-injection harnesses surfaces these |
99
+ | LLM-fronted application surfaces | AML.T0043 (Craft Adversarial Data) prerequisite — adversarial inputs surfaced before deployment | CWE-20 (Improper Input Validation on prompt-derived control flow) | EU AI Act Art. 15 robustness operationalization does not name adversarial-input fuzz; no NIST/ISO/PCI control covers prompt fuzz at all |
100
+ | Kernel system-call surface | T1068 (Exploitation for Privilege Escalation) prerequisite — kernel weaknesses surfaced before they ship | CWE-787, CWE-416 | No framework requires kernel-fuzz coverage as a precondition for shipping kernel-mode drivers or modules. syzkaller-equivalent coverage is industry good-practice, not control. |
101
+
102
+ **Why this mapping is conservative:** ATT&CK and ATLAS catalog post-exploit techniques. Fuzz is a pre-exploit control. The map shows the chain: fuzz-prevents-weakness → weakness-enables-TTP. Removing the weakness denies the TTP.
103
+
104
+ ---
105
+
106
+ ## Exploit Availability Matrix (Fuzz Tool Landscape)
107
+
108
+ Tools used by attackers and defenders alike. "AI-assistance" column reflects whether AI-augmented harness generation or input synthesis is available in the toolchain ecosystem as of mid-2026.
109
+
110
+ | Component Class | Tool(s) | Industry Maturity | Integration Cost (engineer-days) | AI-Assistance | Time-to-First-Crash (median, mature target) |
111
+ |---|---|---|---|---|---|
112
+ | Native code / library | AFL++, libFuzzer, honggfuzz | Production-grade since 2015 | 2–5 per harness | Yes (OSS-Fuzz-Gen, Fuzz4All for harness generation; TitanFuzz for inputs) | Minutes to hours on a fresh harness; days to weeks on a mature corpus |
113
+ | OSS C/C++/Rust/Go/Python projects | OSS-Fuzz (managed) | Operational since 2016, 1000+ projects | 3–7 for onboarding | Yes (OSS-Fuzz-Gen integration) | Hours to days |
114
+ | Linux kernel | syzkaller, kAFL, Healer | Operational since 2015 (syzkaller); 5000+ kernel bugs filed | 5–10 for cluster + descriptions | Limited (semantic syscall sequence generation is an open research area) | Hours on a new subsystem; weeks on hardened subsystems |
115
+ | Hypervisor / VMM | kAFL, Nyx, hAFL2 | Operational since 2019 | 10–20 (snapshotting + harness) | Limited | Days to weeks |
116
+ | HTTP / REST APIs | RESTler (Microsoft), Schemathesis, Boofuzz, ZAP fuzzer | Operational; OpenAPI-driven | 1–3 per service (with spec) | Yes (LLM-generated state-machine inference, parameter synthesis) | Minutes to hours |
117
+ | gRPC / Protobuf | Boofuzz with protobuf harness, custom libFuzzer harnesses | Solid but bespoke | 3–7 per service | Yes (harness generation from .proto) | Hours |
118
+ | GraphQL | clairvoyance + custom fuzz, InQL fuzzer | Maturing | 2–5 per schema | Yes (LLM-generated query mutation) | Hours |
119
+ | Parsers (general — XML/JSON/YAML/protobuf/binary formats) | Peach Fuzzer (peach3), AFL++ with format-aware mutators | Mature | 1–3 per format | Yes (grammar inference) | Hours to days |
120
+ | LLM prompts and AI APIs | garak, PromptBench, NeMo Guardrails red-team toolkit, PyRIT (Microsoft) | Maturing rapidly since 2024 | 1–3 per model surface | Yes (this is the AI-vs-AI loop — adversarial generators target the model) | Minutes to hours per attack class |
121
+ | Smart contracts | Echidna, Foundry fuzz, Medusa | Mature in Ethereum ecosystem | 1–3 per contract | Limited | Hours |
122
+
123
+ **Industry maturity for compliance evidence:** OSS-Fuzz, syzkaller, AFL++, libFuzzer, and RESTler are all production-grade. An org that cannot point to which of these (or equivalent) is running against its parser / IPC / API / kernel-mode surfaces has not deployed continuous fuzz as a control regardless of what its SSDF self-assessment claims.
124
+
125
+ ---
126
+
127
+ ## Analysis Procedure
128
+
129
+ Continuous fuzz must be threaded through the three foundational security principles. Single-layer fuzz (e.g., "we fuzz the public API") is brittle by construction.
130
+
131
+ ### Foundational principles
132
+
133
+ **Defense in depth — fuzz at multiple layers.**
134
+ - Unit-level harnesses for each parser entry point (libFuzzer-style, one harness per format / message type)
135
+ - Integration-level fuzz for IPC and serialization boundaries (cross-process, cross-language)
136
+ - Differential fuzz between two implementations of the same protocol (find divergences that indicate at least one bug)
137
+ - Protocol-level fuzz for external API surfaces (RESTler/Schemathesis state-aware)
138
+ - AI-prompt fuzz for any LLM-fronted application surface (garak/PromptBench/PyRIT)
139
+ - Reliance on any single layer is brittle: parser-only fuzz misses IPC-level type confusion; API-only fuzz misses parser bugs reachable behind authentication.
140
+
141
+ **Least privilege — fuzz with the lowest privilege available.**
142
+ - A fuzzer running as root finds different bugs than one running as a sandboxed unprivileged user. Run both.
143
+ - Crash-reproduction must happen under the actual production privilege profile (container UID, seccomp profile, capability set). A crash that requires CAP_SYS_ADMIN is a different finding from one that does not.
144
+ - For kernel fuzz: run unprivileged-user syscall fuzz separately from privileged-user fuzz; both are needed.
145
+
146
+ **Zero trust — every external interface is hostile by construction.**
147
+ - Threat model output → fuzz target list. Every trust boundary identified during threat modeling is an explicit fuzz target.
148
+ - Internal interfaces previously presumed safe (intra-VPC, intra-pod, sidecar IPC) are explicit fuzz targets after zero-trust adoption — the network presumption is no longer compensating.
149
+ - Authenticated endpoints get fuzzed with valid credentials and with credential mutations both.
150
+
151
+ ### Step-by-step procedure
152
+
153
+ **Step 1 — Inventory all fuzz-eligible interfaces.**
154
+ Pull from the threat model and code inventory:
155
+ - Every parser / deserializer (image, video, font, archive, protocol, document, config)
156
+ - Every IPC surface (gRPC, REST, GraphQL, message queues, shared memory)
157
+ - Every native-code library boundary called from a higher-level language (FFI / cgo / JNI / PyO3)
158
+ - Every kernel module or kernel-mode driver shipped
159
+ - Every LLM-fronted endpoint
160
+ - Every state machine that consumes external input
161
+
162
+ **Step 2 — Classify each interface by fuzz approach.**
163
+ - Native code with deterministic input → libFuzzer / AFL++ unit harness
164
+ - OSS dependency → verify OSS-Fuzz enrollment; if absent, file an issue and add to vendor risk register
165
+ - HTTP/REST with OpenAPI spec → RESTler / Schemathesis
166
+ - HTTP/REST without spec → reverse-engineer spec, then Schemathesis; concurrently apply Boofuzz
167
+ - gRPC → libFuzzer harness over the protobuf entry point
168
+ - Kernel module → syzkaller description (syz_struct definitions) + cluster
169
+ - LLM endpoint → garak baseline pass + PromptBench / PyRIT for targeted attack classes
170
+ - Stateful protocol → Boofuzz or stateful AFL++ with corpus seeding
171
+
172
+ **Step 3 — Stand up continuous fuzz infrastructure.**
173
+ - OSS components → OSS-Fuzz enrollment (free for OSS; ClusterFuzzLite for self-hosted)
174
+ - Proprietary components → ClusterFuzzLite in GitHub Actions / GitLab CI / equivalent, or Mayhem / Code Intelligence as commercial alternatives
175
+ - Kernel components → syzkaller dashboard self-hosted with reproducer support
176
+ - LLM endpoints → garak in CI on every model serving update + scheduled deep campaigns
177
+
178
+ **Step 4 — Define crash-triage workflow.**
179
+ - Every crash → CWE classification on intake (memory safety, input validation, command injection, deserialization, etc.) using `data/cwe-catalog.json` as the controlled vocabulary
180
+ - Every crash → severity tag via RWEP factor pre-fill: is the crash reachable from an unauthenticated surface? Is the affected codepath in production? Does it survive ASLR / stack canaries / CFI? These pre-fill RWEP factors when the crash becomes a CVE
181
+ - Triage SLA: P0 (memory corruption on reachable unauthenticated surface) → 24h investigation; P1 (memory corruption gated by auth) → 72h; P2 (denial of service only) → 7 days
182
+ - Every triaged crash → either a code fix or a documented filter-not-fix decision (e.g., harness limitation, false positive due to test setup)
183
+
184
+ **Step 5 — CWE classification on every finding.**
185
+ Crash inventory categorized by CWE root cause. Track quarterly: are CWE-787 / CWE-416 findings trending down (memory-safety improvements landing) or up (new attack surface added)? Are CWE-78 findings appearing where none existed before (regression)?
186
+
187
+ **Step 6 — Run AI-augmented fuzz against high-priority targets.**
188
+ - OSS-Fuzz-Gen or equivalent LLM-driven harness generation against any parser surface with low corpus coverage
189
+ - Differential fuzz between server implementations (e.g., two TLS stacks, two JSON parsers) — AI-assisted divergence detection
190
+ - LLM-fronted endpoints → garak with model-specific probes plus PromptBench-style adversarial generation; PyRIT for orchestrated multi-turn attacks
191
+ - Track time-to-first-crash improvement vs. classical-only fuzz baseline; this is the AI-leverage measurement
192
+
193
+ **Step 7 — Surface uncovered code as a finding.**
194
+ - Coverage report per harness; merged coverage across all harnesses
195
+ - Code reachable from an external interface and not covered by any fuzz harness is a finding, not a metric. Open as a backlog item with the same severity as a missing unit test for security-critical code.
196
+ - This is the step that converts fuzz from "we run fuzz" theater into "we measure where fuzz fails to reach" honest posture.
197
+
198
+ **Step 8 — Integrate into CI/CD as a quality gate.**
199
+ - Pre-merge: every PR touching fuzz-eligible code triggers a fuzz job in CI on the relevant harness(es). Gate: zero new crashes for N CPU-hours (N defined per-target; typical: 30 minutes for parsers, 4 hours for kernel modules).
200
+ - Post-merge: continuous fuzz cluster runs against the main branch corpus, regression-tracking against the previous build.
201
+ - Release gate: no open P0 fuzz findings; all P1 findings have a documented disposition.
202
+
203
+ **Step 9 — Produce compliance evidence.**
204
+ For each shipping component, generate an artifact:
205
+ - Harness inventory (which interfaces have harnesses)
206
+ - Coverage measurement (line / branch / function coverage per harness)
207
+ - Continuous-fuzz uptime metric (CPU-hours fuzzed per release)
208
+ - Crash inventory by CWE class
209
+ - Time-to-fix metric per severity band
210
+
211
+ This artifact is what an auditor receives instead of a self-attestation that "we test for vulnerabilities."
212
+
213
+ **Step 10 — Feed fuzz outputs back into the zero-day learning loop.**
214
+ Internally discovered fuzz findings that map to a CWE class already in `data/cve-catalog.json` are evidence that the framework gap for that class is real. Append the finding to `data/zeroday-lessons.json` (attack vector → control that should have caught it → framework that covers the control → adequacy assessment → new control requirement). Internally found bugs close the loop just as well as external CVEs.
215
+
216
+ ---
217
+
218
+ ## Output Format
219
+
220
+ ```
221
+ ## Fuzz Posture Assessment
222
+
223
+ **Assessment Date:** YYYY-MM-DD
224
+ **Component / Estate:** [scope]
225
+ **Assessor:** [role]
226
+
227
+ ### Fuzz-Eligible Interface Inventory
228
+ | Interface | Class | Harness Present | Tool | CI-Gated | Last Run |
229
+ |---|---|---|---|---|---|
230
+ | [name] | parser/IPC/API/kernel/LLM | Yes/No | [AFL++/libFuzzer/syzkaller/RESTler/garak/...] | Yes/No | YYYY-MM-DD |
231
+
232
+ ### Coverage Report
233
+ | Harness | Line Coverage | Branch Coverage | CPU-Hours / Release | Uncovered Reachable Code |
234
+ |---|---|---|---|---|
235
+ | [name] | [N]% | [N]% | [N] | [list of un-fuzzed reachable functions] |
236
+
237
+ ### Crash Inventory (current release window)
238
+ | Crash ID | CWE | Severity | Surface | Status | Time to Triage | Time to Fix |
239
+ |---|---|---|---|---|---|---|
240
+ | [id] | [CWE-N] | P0/P1/P2 | [interface] | open/fixed/filtered | [duration] | [duration] |
241
+
242
+ ### Quarter-over-Quarter Trend
243
+ | CWE Class | Last Q Count | This Q Count | Direction | Notes |
244
+ |---|---|---|---|---|
245
+ | CWE-787 (OOB Write) | N | N | up/down/flat | [explanation] |
246
+ | CWE-416 (UAF) | N | N | up/down/flat | [explanation] |
247
+ | CWE-20 (Input Validation) | N | N | up/down/flat | [explanation] |
248
+ | CWE-78 (Command Injection) | N | N | up/down/flat | [explanation] |
249
+
250
+ ### Vulnerability Disclosure Intake (prioritized)
251
+ [Ranked list of fuzz-discovered findings with CWE class, RWEP factor pre-fill, owner, target-fix date]
252
+
253
+ ### NIST 800-218 SSDF Evidence Mapping
254
+ | SSDF Practice | Fuzz Artifact Supplied |
255
+ |---|---|
256
+ | PW.7 (Code Review) | [coverage report by harness] |
257
+ | PW.8 (Test Executable Code) | [continuous-fuzz CPU-hours, crash inventory, time-to-fix metrics] |
258
+ | PW.9 (Configure Software to Have Secure Settings by Default) | [harnesses run with production seccomp/capability profile] |
259
+ | RV.1 (Identify and Confirm Vulnerabilities) | [crash triage workflow, CWE-classified inventory] |
260
+ | RV.2 (Assess, Prioritize, and Remediate) | [time-to-fix per severity, RWEP-fed prioritization] |
261
+
262
+ ### Framework Gap Declaration
263
+ [Per-framework statement: which controls the org claims cover this domain, and where the absence of normative fuzz requirements creates a gap. Mandatory rows: NIST 800-218, NIST 800-115, NIST 800-53 SA-11, OWASP ASVS V14, PCI DSS 4.0 6.2, ISO 27001:2022 A.8.29, EU NIS2 Art. 21, EU CRA Annex I, UK CAF B4, ASD Essential 8 / ISM 1235, EU AI Act Art. 15 (if LLM in scope).]
264
+
265
+ ### Compliance Theater Check Result
266
+ [See Compliance Theater Check section — answer the four questions, record the gap]
267
+
268
+ ### Defensive Countermeasure Mapping
269
+ | Fuzz Finding Class | D3FEND Countermeasure | Implementation |
270
+ |---|---|---|
271
+ | Memory-safety crashes (CWE-787, CWE-416) | D3-PSEP (Process Segment Execution Prevention) | DEP/NX enforced; W^X mappings verified |
272
+ | Command injection (CWE-78) | D3-EAL (Executable Allowlisting) | Production exec allowlist with no shell expansion paths |
273
+ | Adversarial AI input (AML.T0043) | D3-IOPR (Input/Output Profiling) | Prompt/response telemetry baseline + drift alerting on garak-discovered probe classes |
274
+
275
+ ### RWEP Pre-Fill for Open Findings
276
+ [For each open fuzz finding likely to become a CVE: pre-filled RWEP factors per the exploit-scoring skill output format]
277
+ ```
278
+
279
+ ---
280
+
281
+ ## Compliance Theater Check
282
+
283
+ Run these four questions against any organization claiming NIST 800-218 SSDF, ISO 27001:2022 A.8.29, PCI DSS 4.0 6.2, OWASP ASVS, or equivalent secure-development conformance:
284
+
285
+ > **Q1.** "Is fuzz a required pre-merge gate for every PR that touches parser, IPC, deserialization, or native-code path? Pull a PR from the last sprint that modified parser code and show me the CI run that includes a fuzz job and its exit criterion. If the gate does not exist, NIST 800-218 PW.8 conformance is paper — the practice is documented but not enforced at the integration point where it matters."
286
+
287
+ > **Q2.** "Are AI-augmented fuzz campaigns running against your high-priority targets (parsers, kernel modules if shipped, LLM endpoints if any)? Specifically, can you produce evidence of OSS-Fuzz-Gen / Fuzz4All / equivalent harness-generation output, or garak / PyRIT runs against LLM endpoints, within the current release window? If the answer is 'we run classical AFL++/libFuzzer with hand-written harnesses,' the org is fuzzing at the 2020 industry frontier while attackers fuzz at the 2026 frontier. The asymmetry is the finding."
288
+
289
+ > **Q3.** "Is time-to-fix measured on fuzz-discovered findings, broken out by CWE class and severity? Show the last quarter's metric. If the answer is 'we don't differentiate fuzz findings from other bug reports,' the org cannot demonstrate that fuzz is an effective control — there is no signal that fuzz output is acted on faster than scanner output, and the framework claim of 'we test for vulnerabilities' collapses to 'we file tickets we don't measure.'"
290
+
291
+ > **Q4.** "What is the merged coverage of all fuzz harnesses against the external attack surface? What reachable code is not covered by any harness? If the answer is 'we don't measure merged coverage' or 'we don't track uncovered reachable code as a finding,' the fuzz program optimizes for the existing harnesses (selection bias) and the framework gap (no normative requirement that uncovered code be a finding) is the operational gap."
292
+
293
+ **Theater answer pattern:** "We run fuzz on a quarterly basis. We have AFL running against our main parser. We don't have specific metrics."
294
+
295
+ **Real-posture answer pattern:** "Every PR touching parser, IPC, or native-code path triggers a per-harness fuzz job in CI; the gate is zero new crashes in 30 CPU-minutes for parsers, 4 CPU-hours for kernel modules. Merged branch coverage across harnesses is 78% of reachable external-surface code; the uncovered 22% is in the backlog at P1. AI-augmented harness generation runs nightly via OSS-Fuzz-Gen on internal repos. P0 fuzz findings have a 24-hour triage SLA with a 7-day median time-to-fix last quarter (CWE-787: 3 findings, all fixed; CWE-416: 1 finding, fixed). garak runs against the model-serving stack pre-deployment with a fixed probe set."
296
+
297
+ The gap between the two patterns is the size of the fuzz-as-control theater.
298
+
299
+ ---
300
+
301
+ ## Defensive Countermeasure Mapping
302
+
303
+ Fuzz output is most useful when it routes directly to a deployed countermeasure rather than only to a code fix. Map each fuzz finding class to a D3FEND defensive technique so the operational response includes both the source-level remediation and the runtime hardening that bounds the blast radius if the fix is delayed.
304
+
305
+ | Fuzz Finding Class | Root CWE | D3FEND Countermeasure | Why This Pairing | Implementation Note |
306
+ |---|---|---|---|---|
307
+ | Memory-safety: out-of-bounds write | CWE-787 | D3-PSEP (Process Segment Execution Prevention) | Even when the OOB write reaches an executable region, DEP/NX denies the resulting code from executing. D3-PSEP bounds the impact while the upstream fix lands. | Enforce W^X mappings, NX stack, NX heap; verify on every binary at release time |
308
+ | Memory-safety: use-after-free | CWE-416 | D3-PSEP | Heap UAF that achieves arbitrary write benefits from segment-execution prevention identically to OOB write. | Same as above; combine with hardened allocator (e.g., GWP-ASan, scudo) and ASLR (D3-ASLR available in `data/d3fend-catalog.json`). |
309
+ | Input validation failures with command-construction reachable paths | CWE-78 | D3-EAL (Executable Allowlisting) | Command injection succeeds when an attacker invokes an unexpected binary. D3-EAL constrains the runtime exec set so injected commands fail at the allowlist boundary even when the input validation regression ships. | Production exec allowlist; no shell-expansion paths in the trusted set; audit denied-exec events as high-severity. |
310
+ | Generic input validation failures | CWE-20 | D3-EAL (where the downstream effect is exec); D3-IOPR (where the effect is logical / data-plane) | Input validation issues with non-exec consequences need profile-based detection of out-of-bounds parameter usage. | Pair input validation fixes with a runtime profile of acceptable parameter shapes; alert on drift. |
311
+ | Adversarial AI inputs (prompt injection variants, jailbreaks) | CWE-20 (improper validation of prompt-derived control flow) | D3-IOPR (Input/Output Profiling) | Prompt-fuzz outputs (garak/PromptBench/PyRIT) produce a probe corpus. Profiling prompt-and-response telemetry against that corpus identifies the same attack class at runtime. | Maintain a probe corpus from continuous prompt fuzz; emit a telemetry signal when production traffic matches a probe class; integrate with the AI-attack-surface skill output. |
312
+
313
+ **Why this section exists:** A fuzz finding that produces only a source-level fix is half-deployed. The other half — the runtime control that limits exploitability of any latent variant or regression — is what makes fuzz a security control rather than a quality activity. Every fuzz finding closes with both halves.