@blamejs/exceptd-skills 0.9.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (136) hide show
  1. package/AGENTS.md +232 -0
  2. package/ARCHITECTURE.md +267 -0
  3. package/CHANGELOG.md +616 -0
  4. package/CONTEXT.md +203 -0
  5. package/LICENSE +200 -0
  6. package/NOTICE +82 -0
  7. package/README.md +307 -0
  8. package/SECURITY.md +73 -0
  9. package/agents/README.md +81 -0
  10. package/agents/report-generator.md +156 -0
  11. package/agents/skill-updater.md +102 -0
  12. package/agents/source-validator.md +119 -0
  13. package/agents/threat-researcher.md +149 -0
  14. package/bin/exceptd.js +183 -0
  15. package/data/_indexes/_meta.json +88 -0
  16. package/data/_indexes/activity-feed.json +362 -0
  17. package/data/_indexes/catalog-summaries.json +229 -0
  18. package/data/_indexes/chains.json +7135 -0
  19. package/data/_indexes/currency.json +359 -0
  20. package/data/_indexes/did-ladders.json +451 -0
  21. package/data/_indexes/frequency.json +2072 -0
  22. package/data/_indexes/handoff-dag.json +476 -0
  23. package/data/_indexes/jurisdiction-clocks.json +967 -0
  24. package/data/_indexes/jurisdiction-map.json +536 -0
  25. package/data/_indexes/recipes.json +319 -0
  26. package/data/_indexes/section-offsets.json +3656 -0
  27. package/data/_indexes/stale-content.json +14 -0
  28. package/data/_indexes/summary-cards.json +1736 -0
  29. package/data/_indexes/theater-fingerprints.json +381 -0
  30. package/data/_indexes/token-budget.json +2137 -0
  31. package/data/_indexes/trigger-table.json +1374 -0
  32. package/data/_indexes/xref.json +818 -0
  33. package/data/atlas-ttps.json +282 -0
  34. package/data/cve-catalog.json +496 -0
  35. package/data/cwe-catalog.json +1017 -0
  36. package/data/d3fend-catalog.json +738 -0
  37. package/data/dlp-controls.json +1039 -0
  38. package/data/exploit-availability.json +67 -0
  39. package/data/framework-control-gaps.json +1255 -0
  40. package/data/global-frameworks.json +2913 -0
  41. package/data/rfc-references.json +324 -0
  42. package/data/zeroday-lessons.json +377 -0
  43. package/keys/public.pem +3 -0
  44. package/lib/framework-gap.js +328 -0
  45. package/lib/job-queue.js +195 -0
  46. package/lib/lint-skills.js +536 -0
  47. package/lib/prefetch.js +372 -0
  48. package/lib/refresh-external.js +713 -0
  49. package/lib/schemas/cve-catalog.schema.json +151 -0
  50. package/lib/schemas/manifest.schema.json +106 -0
  51. package/lib/schemas/skill-frontmatter.schema.json +113 -0
  52. package/lib/scoring.js +149 -0
  53. package/lib/sign.js +197 -0
  54. package/lib/ttp-mapper.js +80 -0
  55. package/lib/validate-catalog-meta.js +198 -0
  56. package/lib/validate-cve-catalog.js +213 -0
  57. package/lib/validate-indexes.js +83 -0
  58. package/lib/validate-package.js +162 -0
  59. package/lib/validate-vendor.js +85 -0
  60. package/lib/verify.js +216 -0
  61. package/lib/worker-pool.js +84 -0
  62. package/manifest-snapshot.json +1833 -0
  63. package/manifest.json +2108 -0
  64. package/orchestrator/README.md +124 -0
  65. package/orchestrator/dispatcher.js +140 -0
  66. package/orchestrator/event-bus.js +146 -0
  67. package/orchestrator/index.js +874 -0
  68. package/orchestrator/pipeline.js +201 -0
  69. package/orchestrator/scanner.js +327 -0
  70. package/orchestrator/scheduler.js +137 -0
  71. package/package.json +113 -0
  72. package/sbom.cdx.json +158 -0
  73. package/scripts/audit-cross-skill.js +261 -0
  74. package/scripts/audit-perf.js +160 -0
  75. package/scripts/bootstrap.js +205 -0
  76. package/scripts/build-indexes.js +721 -0
  77. package/scripts/builders/activity-feed.js +79 -0
  78. package/scripts/builders/catalog-summaries.js +67 -0
  79. package/scripts/builders/currency.js +109 -0
  80. package/scripts/builders/cwe-chains.js +105 -0
  81. package/scripts/builders/did-ladders.js +149 -0
  82. package/scripts/builders/frequency.js +89 -0
  83. package/scripts/builders/jurisdiction-clocks.js +126 -0
  84. package/scripts/builders/recipes.js +159 -0
  85. package/scripts/builders/section-offsets.js +162 -0
  86. package/scripts/builders/stale-content.js +171 -0
  87. package/scripts/builders/summary-cards.js +166 -0
  88. package/scripts/builders/theater-fingerprints.js +198 -0
  89. package/scripts/builders/token-budget.js +96 -0
  90. package/scripts/check-manifest-snapshot.js +217 -0
  91. package/scripts/predeploy.js +267 -0
  92. package/scripts/refresh-manifest-snapshot.js +57 -0
  93. package/scripts/refresh-sbom.js +222 -0
  94. package/skills/age-gates-child-safety/skill.md +456 -0
  95. package/skills/ai-attack-surface/skill.md +282 -0
  96. package/skills/ai-c2-detection/skill.md +440 -0
  97. package/skills/ai-risk-management/skill.md +311 -0
  98. package/skills/api-security/skill.md +287 -0
  99. package/skills/attack-surface-pentest/skill.md +381 -0
  100. package/skills/cloud-security/skill.md +384 -0
  101. package/skills/compliance-theater/skill.md +365 -0
  102. package/skills/container-runtime-security/skill.md +379 -0
  103. package/skills/coordinated-vuln-disclosure/skill.md +473 -0
  104. package/skills/defensive-countermeasure-mapping/skill.md +300 -0
  105. package/skills/dlp-gap-analysis/skill.md +337 -0
  106. package/skills/email-security-anti-phishing/skill.md +206 -0
  107. package/skills/exploit-scoring/skill.md +331 -0
  108. package/skills/framework-gap-analysis/skill.md +374 -0
  109. package/skills/fuzz-testing-strategy/skill.md +313 -0
  110. package/skills/global-grc/skill.md +564 -0
  111. package/skills/identity-assurance/skill.md +272 -0
  112. package/skills/incident-response-playbook/skill.md +546 -0
  113. package/skills/kernel-lpe-triage/skill.md +303 -0
  114. package/skills/mcp-agent-trust/skill.md +326 -0
  115. package/skills/mlops-security/skill.md +325 -0
  116. package/skills/ot-ics-security/skill.md +340 -0
  117. package/skills/policy-exception-gen/skill.md +437 -0
  118. package/skills/pqc-first/skill.md +546 -0
  119. package/skills/rag-pipeline-security/skill.md +294 -0
  120. package/skills/researcher/skill.md +310 -0
  121. package/skills/sector-energy/skill.md +409 -0
  122. package/skills/sector-federal-government/skill.md +302 -0
  123. package/skills/sector-financial/skill.md +398 -0
  124. package/skills/sector-healthcare/skill.md +373 -0
  125. package/skills/security-maturity-tiers/skill.md +464 -0
  126. package/skills/skill-update-loop/skill.md +463 -0
  127. package/skills/supply-chain-integrity/skill.md +318 -0
  128. package/skills/threat-model-currency/skill.md +404 -0
  129. package/skills/threat-modeling-methodology/skill.md +312 -0
  130. package/skills/webapp-security/skill.md +281 -0
  131. package/skills/zeroday-gap-learn/skill.md +350 -0
  132. package/vendor/blamejs/LICENSE +201 -0
  133. package/vendor/blamejs/README.md +54 -0
  134. package/vendor/blamejs/_PROVENANCE.json +54 -0
  135. package/vendor/blamejs/retry.js +335 -0
  136. package/vendor/blamejs/worker-pool.js +418 -0
@@ -0,0 +1,325 @@
1
+ ---
2
+ name: mlops-security
3
+ version: "1.0.0"
4
+ description: MLOps pipeline security for mid-2026 — training data integrity, model registry signing, deployment pipeline provenance, inference serving hardening, drift detection, feedback loop integrity; covers MLflow / Kubeflow / Vertex AI / SageMaker / Azure ML / Hugging Face
5
+ triggers:
6
+ - mlops security
7
+ - ml pipeline security
8
+ - model registry security
9
+ - training data integrity
10
+ - mlflow
11
+ - kubeflow
12
+ - vertex ai
13
+ - sagemaker
14
+ - azure ml
15
+ - hugging face
16
+ - model signing
17
+ - model card
18
+ - data card
19
+ - feature store
20
+ - drift detection
21
+ - model monitoring
22
+ data_deps:
23
+ - cve-catalog.json
24
+ - atlas-ttps.json
25
+ - framework-control-gaps.json
26
+ - cwe-catalog.json
27
+ - d3fend-catalog.json
28
+ - rfc-references.json
29
+ atlas_refs:
30
+ - AML.T0010
31
+ - AML.T0018
32
+ - AML.T0020
33
+ - AML.T0043
34
+ - AML.T0017
35
+ attack_refs:
36
+ - T1195.001
37
+ - T1565
38
+ framework_gaps:
39
+ - NIST-800-218-SSDF
40
+ - SLSA-v1.0-Build-L3
41
+ - ISO-IEC-42001-2023-clause-6.1.2
42
+ - NIST-AI-RMF-MEASURE-2.5
43
+ - OWASP-LLM-Top-10-2025-LLM08
44
+ rfc_refs:
45
+ - RFC-8032
46
+ cwe_refs:
47
+ - CWE-1426
48
+ - CWE-1395
49
+ - CWE-1357
50
+ - CWE-502
51
+ d3fend_refs:
52
+ - D3-EHB
53
+ - D3-EAL
54
+ - D3-IOPR
55
+ forward_watch:
56
+ - CycloneDX 1.7 ML-BOM enrichment — training-data lineage fields and model-card embedding stabilize; re-baseline ML-BOM coverage when published
57
+ - SPDX 3.1 AI / Dataset profile maturation — dataset provenance schema firms up; re-audit training-data lineage attestations
58
+ - OpenSSF model-signing emergence to v1.0 — Sigstore-based model-weight signing; track for production adoption and admission-control integration
59
+ - SLSA v1.1 ML profile (draft) — model-provenance extension for training-run attestation chains; track ID and section changes
60
+ - EU AI Act high-risk technical-file implementing acts (2026-2027) — operational requirements for Article 10 / 13 / 15 documentation may pin ML-BOM or model-signing
61
+ - MITRE ATLAS v5.2 — track AML.T0010 sub-technique expansion and any new MLOps-pipeline-specific TTPs
62
+ last_threat_review: "2026-05-11"
63
+ ---
64
+
65
+ # MLOps Pipeline Security Assessment
66
+
67
+ ## Threat Context (mid-2026)
68
+
69
+ MLOps replaced ad-hoc ML by 2023 — MLflow, Kubeflow Pipelines, Weights & Biases, Vertex AI Pipelines, SageMaker Pipelines, Azure ML Studio, and Hugging Face Hub are now the operational substrate for most production ML. By mid-2026, adversarial pressure has caught up. The MLOps lifecycle (data ingestion → feature store → training pipeline → experiment tracking → model registry → deployment pipeline → inference serving → monitoring → feedback loop) is now a contiguous supply chain whose every handoff is a documented attack class.
70
+
71
+ The defining realities for mid-2026:
72
+
73
+ - **Training-data poisoning is documented operational practice, not academic exercise.** Hugging Face has executed periodic model and dataset takedowns through 2024-2026 for embedded backdoor weights and poisoned training corpora; the Mithril repository takedown in 2024 (embedded backdoor in distributed model weights) is the canonical public reference. Academic demonstrations of small-fraction targeted poisoning (BadNets, TrojanNN, BackdoorBench) show that <1% of training samples can achieve targeted misclassification at >90% attack success — this is the AML.T0020 class made concrete.
74
+ - **Model weights are native binary artifacts that execute on load.** PyTorch `.pt` checkpoints in code-executing serialization (Python object-graph serialization) are CWE-502 deserialization vectors; periodic CVEs against PyTorch and TensorFlow demonstrate arbitrary code execution via crafted checkpoints (TorchServe deserialization issues, TensorFlow `SavedModel` deserialization, ONNX shape-inference parsers). GGUF format gaps are still maturing — parsing logic for quantized LLM weights has produced multiple memory-safety findings in 2025-2026. Hash-pinning a malicious blob does not prevent execution; only signature verification against a pinned publishing key (Sigstore keyless or OpenSSF model-signing) plus a non-executing format (safetensors) closes the class. See `supply-chain-integrity` for the artifact-layer treatment; this skill addresses the MLOps-pipeline integration.
75
+ - **Deployment-pipeline compromise is a transitive supply chain.** The chain runs AI-codegen IDE (Copilot, Cursor, Claude Code) → notebook (Jupyter, Colab, Databricks) → training-run orchestrator (Kubeflow, Vertex, SageMaker) → model registry (MLflow Registry, SageMaker Model Registry, Vertex Model Registry, Hugging Face Hub) → deployment pipeline (KServe, SageMaker endpoint, Vertex endpoint, Azure ML online endpoint) → inference service. Each step is a handoff where provenance can be lost. AML.T0010 (ML Supply Chain Compromise) sub-techniques AML.T0010.001 (ML framework), AML.T0010.002 (model repository), and AML.T0010.003 (MCP server) are now all realized attack classes.
76
+ - **Drift detection often only watches accuracy on labeled holdout sets, missing semantic-drift caused by silent input distribution shift or active adversarial probing.** Most production drift dashboards (Evidently, Arize, Fiddler, WhyLabs) instrument data-quality and accuracy regression but stop short of adversarial-input detection or output anomaly profiling. AML.T0043 (Craft Adversarial Data) is the class missed.
77
+ - **Experiment-tracking systems are credential goldmines.** MLflow tracking servers, Weights & Biases workspaces, and Vertex Experiments routinely contain API keys, dataset access tokens, and customer-data sample rows in run artifacts. Public CVEs against MLflow (path-traversal, SSRF, authentication bypass — CVE-2023-43472 class and follow-ons through 2024-2025) demonstrate this is not theoretical. Model registries without RBAC are de-facto unauthenticated.
78
+ - **The feedback loop is a poisoning vector.** Production models that retrain on human feedback, click-through data, or LLM-as-judge labels close the loop adversaries already exploit: AML.T0043 (Craft Adversarial Data) → feedback collection → retrain → poisoned model in production. The defense is provenance on every retrain plus statistical detection of feedback distribution shift.
79
+
80
+ This skill is distinct from `rag-pipeline-security` (which is retrieval-side of the inference path) and `ai-attack-surface` (which is the broader technical attack surface). MLOps-security covers the full ML lifecycle as a supply chain, with explicit defense per layer.
81
+
82
+ ---
83
+
84
+ ## Framework Lag Declaration
85
+
86
+ | Framework | Control | Why It Fails for MLOps in mid-2026 |
87
+ |---|---|---|
88
+ | NIST SP 800-218 SSDF | PS / PW / RV practices (verify integrity, configure software securely, respond to vulnerabilities) | SSDF v1.1 (2022) is software-development process language. It does not operationalize ML artifacts: training datasets, model weights, hyperparameter configurations, experiment-run metadata, and feature-store entries are not "software" in SSDF's scope. An organization can claim full SSDF conformance with no model-weight signing, no training-data lineage attestation, and no model-registry provenance. AI-generated code provenance is not addressed. See `data/framework-control-gaps.json` `NIST-800-218-SSDF` entry. |
89
+ | SLSA v1.0 | Build L3 (hardened builder, isolated, signed provenance) | SLSA Build L3 applies to software-build pipelines. The ML-specific extension — model provenance, training-data lineage, training-run attestation — is on the SLSA v1.1 draft roadmap, not in v1.0. Even where SLSA L3 is achieved for the training-script repository, the model artifact emerging from the training run is not covered by a v1.0-conformant attestation. See `data/framework-control-gaps.json` `SLSA-v1.0-Build-L3`. |
90
+ | ISO/IEC 42001:2023 | Clause 6.1.2 (AI risk assessment) | AI management-system standard. Clause 6.1.2 requires identification of AI risks but is process-focused — no technical floor for training-data integrity controls, model-weight signing, drift-detection cadence, or feedback-loop attestation. An organization can be 42001-certified with none of these in place. See `data/framework-control-gaps.json` `ISO-IEC-42001-2023-clause-6.1.2`. |
91
+ | NIST AI RMF | MEASURE 2.5 (Continuous Monitoring) | Recommends operational monitoring but provides no specific technical requirements for MLOps. Drift detection cadence is unspecified; adversarial-input monitoring is unspecified; feedback-loop integrity is unspecified. See `data/framework-control-gaps.json` `NIST-AI-RMF-MEASURE-2.5`. |
92
+ | OWASP LLM Top 10 (2025) | LLM08 (Vector and Embedding Weaknesses) | Retrieval-side concern. Does not cover training-pipeline integrity, model-registry RBAC, deployment-pipeline gating, or inference-serving runtime hardening. See `rag-pipeline-security` for retrieval coverage; this gap remains for the rest of the MLOps lifecycle. See `data/framework-control-gaps.json` `OWASP-LLM-Top-10-2025-LLM08`. |
93
+ | EU AI Act (Regulation 2024/1689) | Article 10 (data governance), Article 13 (technical documentation), Article 15 (accuracy, robustness, cybersecurity) for high-risk AI | Requires training-data documentation and a technical file for high-risk AI systems. Does not specify ML-BOM format, model-weight signing technology, training-data lineage attestation format, or drift-detection cadence. CycloneDX 1.6 ML-BOM and SPDX 3.0 AI profile are usable implementation vehicles, but neither is mandated. Implementing acts through 2026-2027 may tighten this. |
94
+ | UK DSIT AI Cyber Code of Practice (2025) | 13 principles for secure AI development and deployment | Principles-based code published by Department for Science, Innovation and Technology in 2025. Names training-data integrity, model-deployment security, monitoring, and supply chain — but as principles, not testable controls. No technical floor for signing, lineage, or drift cadence. |
95
+ | AU Voluntary AI Safety Standard | 10 guardrails (2024) | Voluntary; principles-language similar to UK DSIT. No technical floor; no signing, no lineage attestation, no drift cadence required. |
96
+ | JP AI Strategy Council "Society Principles" | Principles for human-centric AI | Higher-level than UK / AU; aspirational rather than operational. METI's AI Operator Guidelines (2024) add some operational guidance but no MLOps-specific technical floor. |
97
+ | IL INCD AI Systems Cyber Defense Methodology (2024) | INCD AI methodology | Closest-to-operational national methodology in this list — names supply-chain, training-data, model-integrity, and monitoring as in-scope. Recommends but does not mandate signing or lineage attestation. |
98
+ | SG AI Verify Foundation testing framework | Model Card + AI Verify toolkit | Testing-and-documentation framework, not a security control. Useful for transparency; not sufficient for MLOps integrity. |
99
+ | IN MeitY pending AI Act | Draft (2025-2026) | Not yet in force as of 2026-05; sector-specific guidance from SEBI / RBI / IRDAI applies in finance. No MLOps-specific technical floor enacted. |
100
+ | US NYDFS Part 500 + 2024 AI letter | 23 NYCRR 500 + DFS Industry Letter on AI Cybersecurity Risks (Oct 2024) | Letter classifies AI as a material risk and requires covered entities to address AI-specific vectors including training-data integrity and model-supply-chain risk. Letter is interpretive; underlying Part 500 controls (500.11 third-party, 500.07 access privileges) are the enforceable hooks. No prescriptive MLOps technical floor. |
101
+ | US NIST 800-53 Rev 5 | SI-7 (information integrity), SA-12 (supply chain), SI-4 (system monitoring) | Apply nominally to ML artifacts but specify no MLOps-specific evidence. Auditors accept process documents. |
102
+ | ISO 27001:2022 | A.5.21 (ICT supply chain), A.8.16 (monitoring), A.8.28 (secure coding) | Process-language across the board. Same lag pattern as for traditional software supply chain. |
103
+
104
+ **Fundamental gap:** no framework requires cryptographic provenance verification at every MLOps handoff (data → training → registry → deployment → inference) as the integrity control. Frameworks accept process and inventory evidence. The technical standards (CycloneDX 1.6 ML-BOM, SPDX 3.0 AI profile, OpenSSF model-signing, in-toto for ML, SLSA ML extension draft) exist but are unmandated as of mid-2026.
105
+
106
+ ---
107
+
108
+ ## TTP Mapping
109
+
110
+ Descriptions sourced from `data/atlas-ttps.json` (ATLAS v5.1.0, released 2025-11-01).
111
+
112
+ | ATLAS / ATT&CK ID | Technique | MLOps Lifecycle Stage | Gap |
113
+ |---|---|---|---|
114
+ | AML.T0010 | ML Supply Chain Compromise (sub-techniques: GPU Firmware, ML Framework, Model Repository, MCP Server) | Cross-cutting — touches every ingestion point: dependencies in training environment (AML.T0010.001), model pulls from Hugging Face / vendor registries (AML.T0010.002), MCP plugins in dev tooling (AML.T0010.003) | No framework mandates registry-side cryptographic verification of all ingested artifacts; the SLSA-style attestation chain for ML artifacts is draft, not required |
115
+ | AML.T0018 | Manipulate AI Model (sub-techniques: Poison Training Data, Trojan Model via direct weight manipulation, Federated Learning Poisoning) | Training pipeline and post-training tampering — adversary modifies weights either through poisoned training data persisted into weights or through direct binary edit of an unsigned checkpoint | No framework requires model-weight signature verification at registry write and at deployment read; CWE-502 deserialization risk on `.pt` / `SavedModel` is unmapped to compliance control |
116
+ | AML.T0020 | Poison Training Data (sub-techniques: Inject at Scale, Craft Targeted, RAG Knowledge Base Poisoning) | Data ingestion → feature store → training. Adversary contaminates training corpus to embed targeted misbehavior. Sub-technique AML.T0020.002 is RAG-side (see `rag-pipeline-security`); AML.T0020.000 / 001 are MLOps-side. | No framework requires training-data lineage attestation, source signing, or poisoning-detection scanning at ingestion. EU AI Act Art. 10 requires data-governance documentation but not cryptographic attestation. |
117
+ | AML.T0043 | Craft Adversarial Data (White-Box, Black-Box, Physical) | Inference serving and feedback loop — adversary crafts inputs to either cause misclassification at inference time or to poison the feedback corpus when feedback is logged for retraining | No framework requires adversarial-robustness testing for deployed models or adversarial-input detection at the serving layer; AI RMF MEASURE-2.5 recommends but does not require |
118
+ | AML.T0017 | Discover ML Model Family / Ontology (Probe, Extract System Prompt, Map Filters) | Model registry exposure — adversary maps deployed model family, extracts metadata, infers training corpus, harvests prompts and guardrails | No framework requires model-registry RBAC at the granularity needed (per-project read scoping, signed registry queries, audit of model-extraction-pattern queries) |
119
+ | T1195.001 | Supply Chain Compromise: Software Dependencies and Development Tools | Training pipeline dependency chain — Python wheels, CUDA drivers, ML framework versions, notebook kernels | SCA detects known-vulnerable; XZ-class novel compromise is not detectable without SLSA L3 + reproducible builds for the training environment |
120
+ | T1565 | Data Manipulation (Stored, Transmitted, Runtime) | Cross-cuts every MLOps stage — manipulation of stored training data, transmitted features to inference, or runtime model state | SI-7 maps to traditional file/firmware integrity; extending to feature-store payload integrity and embedding-space integrity is not in current control |
121
+
122
+ Cross-walk to CWE (see `data/cwe-catalog.json`):
123
+
124
+ | CWE | Why It Maps |
125
+ |---|---|
126
+ | CWE-1426 (AI/ML — Improper Validation of Generative AI Output) | Output-validation gap on the inference-serving layer; feedback-loop integrity depends on validating model outputs before they enter retrain corpora |
127
+ | CWE-1395 (Dependency on Vulnerable AI/ML Components) | Training pipelines pull AI-specific dependencies (PyTorch, TensorFlow, transformers, ML framework plugins) where reachability analysis is rarely applied; pinning helps but is not signature verification |
128
+ | CWE-1357 (Reliance on Insufficiently Trustworthy Component) | Continuous re-evaluation of model-publisher trust — the Hugging Face takedown class is exactly the CWE-1357 lag (publisher-position compromise that procurement-time review does not catch) |
129
+ | CWE-502 (Deserialization of Untrusted Data) | Model weights in code-executing serialization formats — Python-object `.pt`, executable `SavedModel` payloads, unsafe ONNX parsers, GGUF parsing memory-safety findings — reject and migrate to safetensors |
130
+
131
+ ---
132
+
133
+ ## Exploit Availability Matrix
134
+
135
+ Sourced from `data/cve-catalog.json`, public incident history, and `data/atlas-ttps.json` real-world-instances as of 2026-05-11. Per AGENTS.md hard rule #1, CVE references include CVSS, KEV, PoC, AI-discovery, exploitation, and patch availability. Technique-class rows are scored as ongoing class risks per AGENTS.md hard rule #3 — RWEP is not assigned because the field is defined for individual CVEs in `data/cve-catalog.json`.
136
+
137
+ | Incident / Class | CVSS | PoC Public? | CISA KEV? | AI-Accelerated? | Patch / Mitigation | SLSA-Detectable? | ML-BOM-Detectable? |
138
+ |---|---|---|---|---|---|---|---|
139
+ | Hugging Face poisoned model weights (Mithril 2024 + ongoing takedowns through 2026) — AML.T0018 class | N/A (technique class) | Yes — repository takedowns and reproducible RCE demonstrations via code-executing checkpoints | No (technique class) | Yes — adversarial fine-tuning at scale + LLM-assisted backdoor design | Reject code-executing serialization (Python-object `.pt`, executable `SavedModel`); require safetensors; verify Sigstore / OpenSSF model-signing against pinned publisher identity | Partially — SLSA-style training-run attestation flags missing provenance | Partial — ML-BOM (CycloneDX 1.6) inventories models; does not by itself attest integrity |
140
+ | MLflow tracking-server vulnerabilities (CVE-2023-43472 class: path-traversal, SSRF, auth-bypass — ongoing patches through 2025-2026) | 7.5 – 9.8 across the class | Yes — multiple public exploit demonstrations | No KEV at time of writing | Partial — security researchers using AI-assisted source analysis surface follow-on findings | MLflow upstream patches; auth front-end (reverse proxy with auth, network segmentation of tracking servers, RBAC layer) | Yes when SBOM tracks MLflow version | Not applicable (the tracking server is software, not a model artifact) |
141
+ | PyTorch / TensorFlow deserialization RCE (CWE-502, recurring) | 7.8 – 9.8 per CVE | Yes — Python-object deserialization RCE is canonical demonstration | No KEV at writing for the model-deserialization specific subset | Yes — automated checkpoint-crafting | Reject code-executing serialization; migrate to safetensors; isolate model-loading services (containerized, seccomp, no outbound network) | Partial — SLSA on training repo flags upstream framework versions | Yes — ML-BOM inventories framework version |
142
+ | BadNets / TrojanNN / BackdoorBench academic class demonstrations (AML.T0020 sub-techniques) | N/A (technique class) | Yes — code released for all three | No | Yes — backdoor pattern generation accelerated by adversarial fine-tuning | Mitigation only: training-data lineage attestation, source signing, poisoning-detection scanning (Spectral Signatures, Activation Clustering, STRIP), provenance on every retrain | Partial — training-data lineage is a SLSA ML extension draft requirement | Partial — ML-BOM can inventory datasets; integrity attestation is separate |
143
+ | MCP server typosquat in `@modelcontextprotocol/*` namespace (AML.T0010.003, ongoing) | N/A (technique class) | Yes — multiple public incidents 2024-2026 | No | Yes — AI accelerates convincing tool-description authoring | Pin versions, verify npm provenance attestation, enforce publisher allowlist; see `mcp-agent-trust` and `supply-chain-integrity` | Yes — SLSA provenance from known publisher fails on typosquat | Yes — SBOM diff at install flags new packages |
144
+ | Feedback-loop poisoning (AML.T0043 → retrain pipeline class risk, ongoing) | N/A (technique class) | Yes — academic demonstrations of LLM-as-judge poisoning, RLHF reward-model poisoning | No | Yes — adversaries use LLMs to generate convincing feedback at scale | Mitigation: feedback-source attestation, statistical detection of feedback distribution shift, holdout retraining where feedback is sampled rather than wholesale incorporated, every retrain provenance-attested with input dataset hash | Yes when retrain pipeline produces in-toto attestation per run | Partial — ML-BOM lists training datasets; lineage to feedback corpus must be explicit |
145
+
146
+ **Tool maturity for defenders (mid-2026 baseline):**
147
+
148
+ - **ProtectAI ModelScan** (open source) — static analysis on model artifacts for unsafe deserialization patterns; production-ready for `.pt`, `.h5`, ONNX, GGUF surface checks.
149
+ - **Garak** (open source) — LLM red-team probing framework; useful for AML.T0017 and AML.T0043 coverage on deployed LLMs.
150
+ - **CleverHans** (open source) — adversarial-input library; production use for AML.T0043 robustness testing.
151
+ - **Hugging Face model scanner** — first-party scanning on uploaded artifacts; surface-level deserialization and known-malicious detection.
152
+ - **Sigstore cosign + OpenSSF model-signing** — production signing for model weights via OCI registries.
153
+ - **Evidently / Arize / Fiddler / WhyLabs** — drift detection; coverage of data-quality drift and accuracy regression; weak on adversarial-input detection and output anomaly profiling without additional configuration.
154
+
155
+ **Interpretation:** because most MLOps integrity threats are architectural (no single vendor CVE to patch), posture is determined by the presence or absence of cross-pipeline cryptographic provenance. CVE-feed-scoped vulnerability management programs will surface MLflow / framework vulns but will not surface model-weight tampering, training-data poisoning, or feedback-loop poisoning. The class-level findings dominate.
156
+
157
+ ---
158
+
159
+ ## Analysis Procedure
160
+
161
+ The procedure threads three foundational principles. Each is non-negotiable; any MLOps-security program missing one of them is structurally vulnerable.
162
+
163
+ ### Defense in depth
164
+
165
+ Layered controls across the MLOps lifecycle — data → training → registry → deployment → inference → monitoring → feedback. One layer is fragile; the depth makes the program robust.
166
+
167
+ - **Training-data lineage attestation.** Every training dataset has a data card (transparency document) plus a cryptographically signed source attestation. The training run records dataset hash and lineage as in-toto evidence.
168
+ - **Training-run integrity.** Training scripts in version control are Sigstore-signed. Training runs execute in isolated environments (per-run ephemeral GPU pods, fresh credentials, no production-write paths). SBOM per training environment captures every dependency.
169
+ - **Model artifact signing.** Output model weights signed by cosign keyless against an OIDC-issued Fulcio certificate. Signatures recorded in the Rekor transparency log. Format restricted to non-executing (safetensors); code-executing formats rejected.
170
+ - **Model registry RBAC and provenance.** Project-scoped read/write permissions on MLflow Registry / SageMaker Model Registry / Vertex Model Registry / Azure ML registry / Hugging Face Hub private orgs. Every registry write produces an in-toto attestation linking training run → dataset hashes → model artifact hash → committing identity.
171
+ - **Deployment pipeline admission gate.** Pre-deployment policy controller (Sigstore policy-controller, Kyverno verify-images extended for model artifacts, custom admission webhook) verifies model artifact signature, attestation chain, and registry-source identity before allowing deployment.
172
+ - **Inference serving runtime hardening.** Serving containers run under restricted seccomp / AppArmor profiles. GPU isolation via NVIDIA confidential computing or dedicated nodes. Falco / Tetragon monitoring for anomalous syscalls. See `container-runtime-security` for the runtime-layer handoff.
173
+ - **Drift and adversarial monitoring.** Statistical drift (input distribution, feature distribution, output distribution) plus semantic drift (concept drift in input meaning) plus adversarial input detection (OOD detection, prediction confidence anomaly, query-pattern profiling — D3-IOPR).
174
+ - **Feedback-loop integrity.** Every retrain run produces in-toto attestation. Feedback sources are attested (signed by collecting service). Statistical detection of feedback distribution shift. Holdout retraining where feedback is sampled and validated rather than wholesale incorporated.
175
+
176
+ ### Least privilege
177
+
178
+ Scope every privilege as narrowly as the MLOps action requires.
179
+
180
+ - Training pipelines have minimum data access — read-only on training datasets, no broad ETL roles, no production-data read by default.
181
+ - Model registries are scoped per project — write only by the training pipeline of that project; read only by deployment pipelines and approved inference services.
182
+ - Serving services load only their own signed models — model-load permission scoped to a single registry path; pull other models requires a separate authorization.
183
+ - AI agents using models in tool-use loops have least scope — the agent's service account is scoped to the action set, never inherited from the deploying user.
184
+ - Notebook environments (Jupyter, Colab, Databricks, SageMaker Studio) have no production-write paths. Notebook-driven training writes to a staging registry, not production.
185
+ - Experiment-tracking systems segregate credentials — no shared service account across projects. MLflow / W&B / Vertex Experiments run on isolated networks with per-project authentication.
186
+
187
+ ### Zero trust
188
+
189
+ Every artifact is untrusted until cryptographically verified.
190
+
191
+ - Every model artifact is untrusted until the signature is verified against a pinned publisher identity (Sigstore Fulcio subject) and the Rekor inclusion proof is checked.
192
+ - Every training data source is untrusted until lineage attestation is verified — a CSV from S3 is not trusted because S3 is in your account; it is trusted because the upstream system signed the data export.
193
+ - Every inference request can re-verify the loaded model's signature — load-time verification is the gate, but the serving service should expose a health-check that re-asserts the model hash for audit.
194
+ - Default-deny on unsigned artifacts at deployment admission and at model-load time. A signature file next to a model is decoration; verifying signature + identity + attestation + Rekor is evidence.
195
+ - Verify the **build config**: the training-run attestation must show a hardened-builder (SLSA L3-equivalent for training, on the draft ML extension trajectory) — not just that some pipeline produced the model.
196
+
197
+ ### Step-by-step procedure
198
+
199
+ 1. **Data lineage inventory.** For every training dataset, record: sources, consumers, purpose, classification, signing identity at source, lineage chain to derived features in the feature store. Build a sources × consumers × purpose matrix. Flag any dataset without a lineage attestation.
200
+
201
+ 2. **Training data integrity controls.** Datasets are versioned (DVC, lakeFS, Delta Lake) with content-hash addressing. Each dataset has a data card per Google / Hugging Face conventions. Each dataset source emits a signed attestation at export. Ingestion pipelines verify the signed attestation before incorporating the dataset into the training corpus. Poisoning detection (Spectral Signatures, Activation Clustering, STRIP, or equivalent) is applied to suspect or third-party datasets.
202
+
203
+ 3. **Training pipeline hardening.** Training scripts are Sigstore-signed in version control. Training runs execute in isolated ephemeral environments (per-run pods, fresh credentials short-lived via OIDC, no production-write paths). Generate SBOM per training environment (Syft on the container image, cdxgen on the Python environment) capturing every dependency including CUDA driver, ML framework version, transformers / accelerators, and notebook kernels.
204
+
205
+ 4. **Model artifact signing.** Use cosign keyless to sign model weights against an OIDC-issued Fulcio certificate, attach as OCI artifact (referrers API) to the model in the registry. Reject code-executing serialization formats — require safetensors or equivalent type-safe format. Maintain an explicit allowlist of approved model publishers (org-internal MLOps registry, vetted Hugging Face orgs, vendor model registries).
206
+
207
+ 5. **Model registry RBAC and provenance attestation.** Configure RBAC per project on MLflow Registry / SageMaker Model Registry / Vertex Model Registry / Azure ML / Hugging Face private orgs. Every registry write emits an in-toto attestation that links training run → dataset hashes → model artifact hash → committing identity. Verify registry queries can be audited.
208
+
209
+ 6. **Deployment pipeline gate.** Implement admission verification at deployment time. For Kubernetes-based serving (KServe, Seldon, BentoML), use Sigstore policy-controller or Kyverno verify-images extended to model artifacts. For managed endpoints (SageMaker, Vertex, Azure ML), use the platform's signing-verification feature where available, otherwise a custom pre-deployment validator. Default-deny on unsigned artifacts.
210
+
211
+ 7. **Inference runtime hardening.** Inference serving containers run under restricted seccomp / AppArmor / SELinux profiles. GPU isolation via NVIDIA confidential computing or dedicated node pools. Runtime monitoring (Falco, Tetragon) on serving processes. Outbound network egress restricted — no unsolicited outbound from inference services. Hand off the runtime-layer treatment to `container-runtime-security`.
212
+
213
+ 8. **Drift detection (semantic + statistical).** Instrument three layers:
214
+ - **Statistical drift** — input feature distributions, output distributions, accuracy on labeled holdout (Evidently, Arize, Fiddler, WhyLabs).
215
+ - **Semantic drift** — concept drift in input meaning; embedding-distribution shift over time; D3-IOPR-style profiling of input/output payloads.
216
+ - **Cadence** — daily statistical, weekly semantic, alert on threshold breach. Quarterly drift review is not sufficient — that is miss-the-attacker territory.
217
+
218
+ 9. **Adversarial monitoring.** Input distribution profiling for OOD detection, prediction confidence anomaly detection, query-pattern profiling (D3-IOPR) to surface AML.T0017 (model probing) and AML.T0043 (adversarial inputs). For LLM-serving, integrate Garak-class probing into a continuous red-team loop.
219
+
220
+ 10. **Feedback loop integrity.** Every retrain run produces an in-toto attestation. Feedback sources are signed by the collecting service. Statistical detection of feedback distribution shift on a per-source basis. Holdout retraining — feedback is sampled and validated against a labeled baseline before incorporation, not wholesale ingested. Verify that every model in production carries a chain of attestations back to the original training run plus every retrain run since.
221
+
222
+ ---
223
+
224
+ ## Output Format
225
+
226
+ ```
227
+ ## MLOps Pipeline Security Assessment
228
+
229
+ **Assessment Date:** YYYY-MM-DD
230
+ **Scope:** [MLOps stack(s): MLflow / Kubeflow / Vertex AI / SageMaker / Azure ML / Hugging Face / DIY]
231
+ **Models in Scope:** [count, classification, deployment surfaces]
232
+ **Frameworks in scope:** [NIST 800-218 SSDF | SLSA v1.0 | ISO/IEC 42001:2023 | NIST AI RMF | OWASP LLM Top 10 | EU AI Act | UK DSIT AI Cyber Code | AU AI Safety Standard | JP Society Principles | IL INCD AI | SG AI Verify | IN MeitY draft | NYDFS Part 500]
233
+
234
+ ### MLOps Stack Inventory
235
+ | Stage | Tooling | Hosted / Self-Managed | Auth Model | Notes |
236
+ |---|---|---|---|---|
237
+ | Data ingestion | | | | |
238
+ | Feature store | | | | |
239
+ | Training orchestrator | | | | |
240
+ | Experiment tracking | | | | |
241
+ | Model registry | | | | |
242
+ | Deployment pipeline | | | | |
243
+ | Inference serving | | | | |
244
+ | Monitoring / drift | | | | |
245
+ | Feedback collection | | | | |
246
+
247
+ ### Training Data Lineage Map
248
+ | Dataset | Source | Classification | Signed at Source? | Data Card? | Consumers | Poisoning Detection Applied? |
249
+
250
+ ### Model Registry Provenance Matrix
251
+ | Model | Registry | Training Run Attested? | Dataset Hashes Recorded? | Artifact Signed? | Publisher Identity Pinned? | Format (safetensors / code-executing / ONNX / GGUF) |
252
+
253
+ ### Deployment Pipeline Gate Coverage
254
+ | Deployment Path | Admission Verification? | Signature Verified? | Attestation Chain Verified? | Default-Deny on Unsigned? |
255
+
256
+ ### Drift Detection Scorecard
257
+ | Model | Statistical Drift Cadence | Semantic Drift Cadence | Adversarial-Input Detection? | Output Anomaly Detection? | Feedback Distribution Monitoring? |
258
+
259
+ ### Model Signing Coverage
260
+ | Class | Count Signed / Total | Publisher Identities Pinned | OpenSSF Model-Signing Used? | Cosign + Rekor? |
261
+
262
+ ### AI Artifact SBOM (ML-BOM) Compliance
263
+ | Artifact Class | CycloneDX 1.6 ML-BOM Coverage | SPDX 3.0 AI Profile Coverage | Training-Data Lineage Embedded? |
264
+
265
+ ### CVE / Incident Exposure
266
+ [MLflow / framework vulns from current `cve-catalog.json`; ongoing class risks per Exploit Availability Matrix]
267
+
268
+ ### Framework Gap Declaration
269
+ [Per framework in scope: which control nominally applies; why current implementation does not close the MLOps integrity gap; what real evidence would close it]
270
+
271
+ ### Gap Remediation Roadmap
272
+ [Prioritized by blast radius (production model classification × query volume × feedback-loop presence). Each item: specific delta, owner, target date, success criterion (e.g., "All production model weights signed via cosign keyless against pinned org Fulcio identity by YYYY-MM-DD, admission gate enforcing in SageMaker deployment pipeline, verification logged with Rekor inclusion proof").]
273
+ ```
274
+
275
+ ---
276
+
277
+ ## Compliance Theater Check
278
+
279
+ Concrete tests that distinguish a paper-compliant MLOps program from one that actually verifies integrity at every handoff. Run all four. Any "we trust X" answer is theater post-Hugging-Face-incidents.
280
+
281
+ 1. **End-to-end provenance chain.** Ask: *"For your last production model deployment, walk me through the chain: data sources → training run → model artifact → registry entry → deployment commit. Paste an attestation or signed artifact at every link."* If any link is missing provenance — if the training run does not record dataset hashes, or the registry entry does not link to the training run attestation, or the deployment commit does not reference a signed artifact — the chain is broken, and the AI Act Article 13 technical-file claims, the 42001 lifecycle claims, and the SSDF integrity claims are theater.
282
+
283
+ 2. **Model artifact signing.** Ask: *"Is your last production model artifact signed? Paste the `cosign verify --certificate-identity=<expected> --certificate-oidc-issuer=<expected>` output, and show the Rekor inclusion proof."* If the answer is "we trust the registry because it's our private MLflow / SageMaker / Vertex / Azure ML" — that is theater post-Hugging-Face-takedowns. The registry is the storage location; signing identifies the publisher. Trusting the storage does not authenticate the contents. A registry compromise (CVE-2023-43472 class on MLflow, IAM misconfiguration on a managed registry) replaces the artifact without signature verification surfacing the change.
284
+
285
+ 3. **Training data poisoning detection.** Ask: *"What is your detection for training-data poisoning? Describe the technique (Spectral Signatures? Activation Clustering? STRIP? data-card review + provenance attestation?) and the cadence."* If the answer is "we trust upstream datasets" or "we use only internal data" — internal data is poisoned through feedback loops (AML.T0043 → retrain → AML.T0020) without explicit feedback-source attestation. Internal-data assumption is the exposure.
286
+
287
+ 4. **Drift detection cadence.** Ask: *"What is the cadence and threshold for drift alerts on production models?"* If quarterly — that is miss-the-attacker territory; an adversary executing a feedback-loop poisoning attack has weeks before the next review. If only on labeled holdout accuracy — semantic drift and adversarial-input distribution shift are invisible. A real program runs statistical drift daily, semantic drift weekly, and has an adversarial-input detector continuously profiling inputs at the serving layer.
288
+
289
+ A genuinely conformant MLOps program answers all four with concrete artifacts: an end-to-end provenance chain printed for any production model, a cosign verify output with pinned publisher identity, a documented poisoning-detection pipeline with measurable false-positive rate, and a drift-detection dashboard showing daily / weekly / continuous cadence.
290
+
291
+ ---
292
+
293
+ ## Defensive Countermeasure Mapping
294
+
295
+ D3FEND techniques referenced (see `data/d3fend-catalog.json`). Each is annotated with defense-in-depth layer position, least-privilege scope, zero-trust posture, and AI-pipeline applicability per AGENTS.md hard rule #9.
296
+
297
+ - **D3-EHB (Executable Hash-based Allowlist)** — Hash-pinned allowlist for model artifacts at load time. Maps to model-weight SHA-256 verification at inference-service load, and to in-toto / SLSA-style attestation enforcement at deployment. Defense-in-depth layer: runtime model-load. Least-privilege scope: serving service has read-only access to a pinned set of model hashes for its project, no read on other models. Zero-trust posture: default-deny on any model hash not in the allowlist. AI-pipeline applicability: persistent registries store the allowlist; ephemeral serving pods pull and verify on each model-load.
298
+
299
+ - **D3-EAL (Executable Allowlisting)** — Runtime restriction of execution to pre-approved executables, extended in the MLOps context to inference-service binary lineage. Closes the loop on training-run signing: even if a tampered training artifact reaches the serving host, D3-EAL on the serving container blocks unauthorized binary execution emerging from a deserialization-RCE in the model artifact. Defense-in-depth layer: runtime inference-service host. Least-privilege scope: serving container has a minimum binary allowlist for the model-serving framework only — no shell, no debugging utilities, no outbound-network utilities. Zero-trust posture: every binary execution is verified against the allowlist regardless of pathway. AI-pipeline applicability: ephemeral serving pods are reprovisioned with the allowlist baked into the immutable image; persistent training runs use a separate, broader allowlist scoped to training-only operations.
300
+
301
+ - **D3-IOPR (Input/Output Profiling)** — Profiling of input and output payloads at inference services to detect adversarial inputs (AML.T0043) and model-probing patterns (AML.T0017). Defense-in-depth layer: serving-layer pre- and post-inference. Least-privilege scope: profiling service has read-only access to inference traffic at the serving proxy; no model-load privileges, no registry-write privileges. Zero-trust posture: every inference request is profiled regardless of source authentication — authenticated users execute AML.T0043 attacks too. AI-pipeline applicability: serves both ephemeral inference pods (profiling sidecar) and persistent monitoring services (drift-detection pipeline ingesting profiled telemetry).
302
+
303
+ Per AGENTS.md hard rule #9, MLOps stacks span three architectural layers each requiring an explicit defense story:
304
+
305
+ - **Ephemeral training jobs** — per-run pods on Kubeflow / Vertex / SageMaker / Ray. SLSA-style training-run attestation is the integrity anchor; D3-EAL on the training container is the runtime control. Live patching is not applicable — runs are torn down post-training.
306
+ - **Persistent model registries** — MLflow Model Registry, SageMaker Model Registry, Vertex Model Registry, Azure ML registry, Hugging Face Hub private orgs. RBAC is the access-layer control; signature attestation on every write is the integrity control. Standard server-hardening + patch-SLA applies.
307
+ - **Ephemeral inference serving pods** — KServe, SageMaker endpoints, Vertex endpoints, Azure ML online endpoints, BentoML, Seldon. Pre-load signature verification + D3-EHB allowlist + D3-EAL + D3-IOPR profiling. Live patching is replacement of the immutable image; rolling redeploy is the operational control.
308
+
309
+ Signing baseline reference: RFC 8032 (Ed25519 / Ed448) is the asymmetric signature algorithm used by Sigstore keyless signing for cosign and is one of the supported algorithms for OpenSSF model-signing. PQC migration to ML-DSA (FIPS 204) / SLH-DSA (FIPS 205) for model-weight signing is on the forward-watch list; track via `pqc-first`.
310
+
311
+ ---
312
+
313
+ ## Hand-Off / Related Skills
314
+
315
+ After producing the MLOps pipeline security assessment, chain into the following skills. Each entry is specific to a finding class this skill produces.
316
+
317
+ - **`rag-pipeline-security`** — retrieval-side of the inference path. Where this skill identifies a feedback-loop poisoning risk or a model serving an embedding-similarity retrieval surface, chain into the RAG skill for the vector-store, retrieval-filter, and indirect-prompt-injection treatment.
318
+ - **`ai-attack-surface`** — broader AI threat landscape. MLOps integrity findings are one component of the wider AI-application threat model; the AI attack surface skill situates them alongside LLM tool-use, prompt-handling, and agent autonomy threats.
319
+ - **`supply-chain-integrity`** — SLSA / Sigstore / in-toto / SBOM foundation. Every signing, attestation, and provenance recommendation in this skill is operationalized through the controls defined there. Model weights are supply-chain artifacts; this skill's MLOps integration sits on top of the supply-chain skill's signing primitives.
320
+ - **`container-runtime-security`** — inference serving hardening. Where this skill identifies a serving-layer hardening gap (D3-EAL, D3-EHB at load, seccomp / AppArmor profiles, GPU isolation, Falco / Tetragon monitoring), hand off the runtime treatment to the container-runtime-security skill.
321
+ - **`cloud-security`** — cloud MLOps. Where the stack is Vertex AI / SageMaker / Azure ML, cloud-side IAM, KMS key custody for signing keys, VPC service controls / private endpoints for registries, and cloud-native admission policies are the operational substrate. Chain into cloud-security for the cloud-control-plane treatment.
322
+ - **`ai-risk-management`** — governance overlay (ISO 42001, ISO 23894, NIST AI RMF). Where this skill identifies a framework gap, the governance overlay translates findings into the management-system documentation, AI impact assessment, and high-risk AI classification work products.
323
+ - **`coordinated-vuln-disclosure`** — AI vulnerability intake. Where this skill surfaces a vendor vulnerability (MLflow class, framework class, MCP server class), or where research surfaces a novel poisoning pattern requiring coordinated disclosure, chain into the CVD skill for the ISO 29147 / 30111 / CSAF 2.0 publication workflow.
324
+
325
+ For ephemeral / serverless MLOps pipelines (per AGENTS.md hard rule #9): training-run lineage attestation in environments where the training pod is torn down before the registry write completes requires that the attestation is emitted from inside the training run and pushed to the registry as a registry-side artifact (OCI referrers API or in-toto bundle attached to the model entry). Live patching of in-flight training runs is architecturally impossible — the scoped alternative is roll-forward (kill the run, re-run from a signed training-script revision) plus post-hoc attestation-chain audit.