@safebrowse/daemon 0.1.2-rc.1 → 0.1.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +15 -15
- package/README.md +31 -31
- package/dist/cli.js +9 -9
- package/dist/index.d.ts +1 -0
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +2 -0
- package/dist/index.js.map +1 -1
- package/dist/parserIsolation.d.ts +12 -0
- package/dist/parserIsolation.d.ts.map +1 -0
- package/dist/parserIsolation.js +57 -0
- package/dist/parserIsolation.js.map +1 -0
- package/dist/parserWorker.d.ts +2 -0
- package/dist/parserWorker.d.ts.map +1 -0
- package/dist/parserWorker.js +89 -0
- package/dist/parserWorker.js.map +1 -0
- package/dist/runtime/config/auditor/v4_prompt_injection_coverage_suite.json +2789 -0
- package/dist/runtime/knowledge_base/safebrowse_vf_action_integrity_patterns.json +1411 -1411
- package/dist/runtime/knowledge_base/safebrowse_vf_artifact_surface_patterns.json +891 -891
- package/dist/runtime/knowledge_base/safebrowse_vf_evaluation_scenarios.json +217 -217
- package/dist/runtime/knowledge_base/safebrowse_vf_incident_response_playbooks.json +209 -209
- package/dist/runtime/knowledge_base/safebrowse_vf_knowledge_base_index.json +143 -143
- package/dist/runtime/knowledge_base/safebrowse_vf_knowledge_base_index.json.sig +1 -1
- package/dist/runtime/knowledge_base/safebrowse_vf_knowledge_bases.zip.sig +1 -1
- package/dist/runtime/knowledge_base/safebrowse_vf_memory_context_poisoning_patterns.json +803 -803
- package/dist/runtime/knowledge_base/safebrowse_vf_policy_controls_catalog.json +686 -686
- package/dist/runtime/knowledge_base/safebrowse_vf_prompt_injection_patterns.json +9930 -9930
- package/dist/runtime/knowledge_base/safebrowse_vf_source_registry.json +345 -345
- package/dist/runtime/knowledge_base/safebrowse_vf_tool_protocol_supply_chain_patterns.json +879 -879
- package/dist/runtime/knowledge_base/safebrowse_vf_trust_signals_provenance.json +480 -480
- package/dist/runtime/knowledge_base/signing/safebrowse_vf_ed25519_public.pem +3 -3
- package/dist/runtime/policies/base/research.yaml +43 -43
- package/dist/runtime/policies/emergency/default.yaml +14 -14
- package/dist/runtime/policies/project/default.yaml +13 -13
- package/dist/runtime/policies/tenant/default.yaml +12 -12
- package/dist/server.d.ts +1 -0
- package/dist/server.d.ts.map +1 -1
- package/dist/server.js +489 -22
- package/dist/server.js.map +1 -1
- package/package.json +53 -53
|
@@ -1,209 +1,209 @@
|
|
|
1
|
-
{
|
|
2
|
-
"kb_meta": {
|
|
3
|
-
"name": "SafeBrowse vf incident response playbooks",
|
|
4
|
-
"version": "vf-final",
|
|
5
|
-
"generated_on": "2026-03-28",
|
|
6
|
-
"entry_count": 18,
|
|
7
|
-
"purpose": "Default response playbooks for containment, rollback, quarantine, and evidence capture."
|
|
8
|
-
},
|
|
9
|
-
"playbooks": [
|
|
10
|
-
{
|
|
11
|
-
"playbook_id": "IR-01",
|
|
12
|
-
"name": "block_and_replan_read_only",
|
|
13
|
-
"goal": "Contain suspected manipulation while allowing limited progress.",
|
|
14
|
-
"default_steps": "Set decision=REPLAN_READ_ONLY; preserve task envelope; do not allow new writable origins or sensitive sinks.",
|
|
15
|
-
"source_ids": [
|
|
16
|
-
"SRC_OPENAI_PROMPT_INJECTION_2026"
|
|
17
|
-
],
|
|
18
|
-
"credibility": "high",
|
|
19
|
-
"last_verified": "2026-03-28"
|
|
20
|
-
},
|
|
21
|
-
{
|
|
22
|
-
"playbook_id": "IR-02",
|
|
23
|
-
"name": "block_and_user_confirm",
|
|
24
|
-
"goal": "Require explicit user approval for a high-impact but possibly legitimate action.",
|
|
25
|
-
"default_steps": "Show structured action summary, source/target origins, and taint summary; execute only on explicit approval.",
|
|
26
|
-
"source_ids": [
|
|
27
|
-
"SRC_GOOGLE_CHROME_AGENTIC_2025"
|
|
28
|
-
],
|
|
29
|
-
"credibility": "high",
|
|
30
|
-
"last_verified": "2026-03-28"
|
|
31
|
-
},
|
|
32
|
-
{
|
|
33
|
-
"playbook_id": "IR-03",
|
|
34
|
-
"name": "quarantine_artifact",
|
|
35
|
-
"goal": "Isolate a suspicious document, viewer, or download for separate analysis.",
|
|
36
|
-
"default_steps": "Detach artifact from main planner context; preserve hashes, provenance, and screenshots/text extracts for review.",
|
|
37
|
-
"source_ids": [
|
|
38
|
-
"SRC_ANTHROPIC_BROWSER_USE_2025"
|
|
39
|
-
],
|
|
40
|
-
"credibility": "high",
|
|
41
|
-
"last_verified": "2026-03-28"
|
|
42
|
-
},
|
|
43
|
-
{
|
|
44
|
-
"playbook_id": "IR-04",
|
|
45
|
-
"name": "revoke_or_rotate_token",
|
|
46
|
-
"goal": "Revoke potentially misused credentials or down-scope active tokens.",
|
|
47
|
-
"default_steps": "Invalidate cached handles; trigger credential broker rotation; mark session for re-auth if needed.",
|
|
48
|
-
"source_ids": [
|
|
49
|
-
"SRC_MCP_SECURITY_BEST_PRACTICES_2025"
|
|
50
|
-
],
|
|
51
|
-
"credibility": "high",
|
|
52
|
-
"last_verified": "2026-03-28"
|
|
53
|
-
},
|
|
54
|
-
{
|
|
55
|
-
"playbook_id": "IR-05",
|
|
56
|
-
"name": "freeze_tool_inventory",
|
|
57
|
-
"goal": "Freeze tool list and block dynamic capability expansion after suspicious changes.",
|
|
58
|
-
"default_steps": "Disallow new tools/manifests until review; keep only previously approved tool set.",
|
|
59
|
-
"source_ids": [
|
|
60
|
-
"SRC_OWASP_SECURE_MCP_GUIDE_2026"
|
|
61
|
-
],
|
|
62
|
-
"credibility": "high",
|
|
63
|
-
"last_verified": "2026-03-28"
|
|
64
|
-
},
|
|
65
|
-
{
|
|
66
|
-
"playbook_id": "IR-06",
|
|
67
|
-
"name": "memory_snapshot_and_rollback",
|
|
68
|
-
"goal": "Restore durable memory to last known-good state after poisoning suspicion.",
|
|
69
|
-
"default_steps": "Take forensic snapshot, verify hash chain, roll back, and mark tainted interval as excluded from future retrieval.",
|
|
70
|
-
"source_ids": [
|
|
71
|
-
"SRC_OWASP_AGENT_MEMORY_GUARD_2026"
|
|
72
|
-
],
|
|
73
|
-
"credibility": "high",
|
|
74
|
-
"last_verified": "2026-03-28"
|
|
75
|
-
},
|
|
76
|
-
{
|
|
77
|
-
"playbook_id": "IR-07",
|
|
78
|
-
"name": "downgrade_session_mode",
|
|
79
|
-
"goal": "Move from normal or write-capable mode to read-only or extract-only mode.",
|
|
80
|
-
"default_steps": "Retain navigation/extraction, disable sends/uploads/mutations/exec and require approvals for re-escalation.",
|
|
81
|
-
"source_ids": [
|
|
82
|
-
"SRC_OPENAI_PROMPT_INJECTION_2026"
|
|
83
|
-
],
|
|
84
|
-
"credibility": "high",
|
|
85
|
-
"last_verified": "2026-03-28"
|
|
86
|
-
},
|
|
87
|
-
{
|
|
88
|
-
"playbook_id": "IR-08",
|
|
89
|
-
"name": "origin_pair_lockdown",
|
|
90
|
-
"goal": "Lock the session to currently approved origin pairs after anomaly detection.",
|
|
91
|
-
"default_steps": "No new source or sink origins; no cross-origin copy/paste outside explicit allowlist.",
|
|
92
|
-
"source_ids": [
|
|
93
|
-
"SRC_GOOGLE_CHROME_AGENTIC_2025"
|
|
94
|
-
],
|
|
95
|
-
"credibility": "high",
|
|
96
|
-
"last_verified": "2026-03-28"
|
|
97
|
-
},
|
|
98
|
-
{
|
|
99
|
-
"playbook_id": "IR-09",
|
|
100
|
-
"name": "sandbox_escalation",
|
|
101
|
-
"goal": "Move suspicious local helper/tool execution into a stricter sandbox profile.",
|
|
102
|
-
"default_steps": "Increase isolation, reduce filesystem/network access, and require additional approvals.",
|
|
103
|
-
"source_ids": [
|
|
104
|
-
"SRC_MCP_SECURITY_BEST_PRACTICES_2025"
|
|
105
|
-
],
|
|
106
|
-
"credibility": "high",
|
|
107
|
-
"last_verified": "2026-03-28"
|
|
108
|
-
},
|
|
109
|
-
{
|
|
110
|
-
"playbook_id": "IR-10",
|
|
111
|
-
"name": "ssrf_network_cutoff",
|
|
112
|
-
"goal": "Temporarily cut off metadata discovery or outbound fetches when SSRF indicators appear.",
|
|
113
|
-
"default_steps": "Deny discovery URLs, redirects, and private-range destinations until investigation completes.",
|
|
114
|
-
"source_ids": [
|
|
115
|
-
"SRC_MCP_SECURITY_BEST_PRACTICES_2025"
|
|
116
|
-
],
|
|
117
|
-
"credibility": "high",
|
|
118
|
-
"last_verified": "2026-03-28"
|
|
119
|
-
},
|
|
120
|
-
{
|
|
121
|
-
"playbook_id": "IR-11",
|
|
122
|
-
"name": "veto_retry_threshold",
|
|
123
|
-
"goal": "Escalate after repeated vetoes to avoid approval grinding.",
|
|
124
|
-
"default_steps": "After N blocked or near-identical retries, stop replanning and surface incident state to host/user.",
|
|
125
|
-
"source_ids": [
|
|
126
|
-
"SRC_NIST_HIJACK_EVAL_2025"
|
|
127
|
-
],
|
|
128
|
-
"credibility": "high",
|
|
129
|
-
"last_verified": "2026-03-28"
|
|
130
|
-
},
|
|
131
|
-
{
|
|
132
|
-
"playbook_id": "IR-12",
|
|
133
|
-
"name": "forensic_export_bundle",
|
|
134
|
-
"goal": "Export replayable evidence bundle for debugging or incident response.",
|
|
135
|
-
"default_steps": "Package decision log, hashes, provenance, traces, sanitized observations, and policy versions.",
|
|
136
|
-
"source_ids": [
|
|
137
|
-
"SRC_BROWSERGYM_GITHUB_2026"
|
|
138
|
-
],
|
|
139
|
-
"credibility": "high",
|
|
140
|
-
"last_verified": "2026-03-28"
|
|
141
|
-
},
|
|
142
|
-
{
|
|
143
|
-
"playbook_id": "IR-13",
|
|
144
|
-
"name": "tool_chain_isolation",
|
|
145
|
-
"goal": "Break cross-tool data flows after suspected poisoning in one tool output.",
|
|
146
|
-
"default_steps": "Stop automatic chaining; require explicit allowlist or user confirmation to pass outputs onward.",
|
|
147
|
-
"source_ids": [
|
|
148
|
-
"SRC_ACE_NDSS_2026"
|
|
149
|
-
],
|
|
150
|
-
"credibility": "high",
|
|
151
|
-
"last_verified": "2026-03-28"
|
|
152
|
-
},
|
|
153
|
-
{
|
|
154
|
-
"playbook_id": "IR-14",
|
|
155
|
-
"name": "cache_flush_and_partition",
|
|
156
|
-
"goal": "Flush or partition suspicious caches/vector stores after poisoning indicators.",
|
|
157
|
-
"default_steps": "Invalidate affected entries; separate tenants; reindex from trusted sources if needed.",
|
|
158
|
-
"source_ids": [
|
|
159
|
-
"SRC_REVPRAG_EMNLP_2025"
|
|
160
|
-
],
|
|
161
|
-
"credibility": "high",
|
|
162
|
-
"last_verified": "2026-03-28"
|
|
163
|
-
},
|
|
164
|
-
{
|
|
165
|
-
"playbook_id": "IR-15",
|
|
166
|
-
"name": "human_triage_required",
|
|
167
|
-
"goal": "Require operator review for regulated, destructive, or ambiguous cases.",
|
|
168
|
-
"default_steps": "Pause execution and surface structured context with recommended next safe step.",
|
|
169
|
-
"source_ids": [
|
|
170
|
-
"SRC_OWASP_AGENTIC_TOP10_2026"
|
|
171
|
-
],
|
|
172
|
-
"credibility": "high",
|
|
173
|
-
"last_verified": "2026-03-28"
|
|
174
|
-
},
|
|
175
|
-
{
|
|
176
|
-
"playbook_id": "IR-16",
|
|
177
|
-
"name": "policy_pack_fail_safe",
|
|
178
|
-
"goal": "Fall back to stricter default policy pack when pack integrity or confidence is uncertain.",
|
|
179
|
-
"default_steps": "Activate restrictive baseline pack with read-only defaults and disabled local execution.",
|
|
180
|
-
"source_ids": [
|
|
181
|
-
"SRC_OWASP_AGENTIC_TOP10_2026"
|
|
182
|
-
],
|
|
183
|
-
"credibility": "high",
|
|
184
|
-
"last_verified": "2026-03-28"
|
|
185
|
-
},
|
|
186
|
-
{
|
|
187
|
-
"playbook_id": "IR-17",
|
|
188
|
-
"name": "artifact_reprocess_with_dual_extractors",
|
|
189
|
-
"goal": "Reprocess suspicious artifact using independent extraction pipelines.",
|
|
190
|
-
"default_steps": "Compare render/text/OCR outputs; keep planner on hold until mismatch resolved.",
|
|
191
|
-
"source_ids": [
|
|
192
|
-
"SRC_IPI_DETECT_REMOVE_ACL_2025"
|
|
193
|
-
],
|
|
194
|
-
"credibility": "high",
|
|
195
|
-
"last_verified": "2026-03-28"
|
|
196
|
-
},
|
|
197
|
-
{
|
|
198
|
-
"playbook_id": "IR-18",
|
|
199
|
-
"name": "adaptive_red_team_capture",
|
|
200
|
-
"goal": "Save attack artifact into evaluation corpus for future regression and adaptive testing.",
|
|
201
|
-
"default_steps": "Tag with family/source/sink context; add to benchmark scenario queue.",
|
|
202
|
-
"source_ids": [
|
|
203
|
-
"SRC_NIST_HIJACK_EVAL_2025"
|
|
204
|
-
],
|
|
205
|
-
"credibility": "high",
|
|
206
|
-
"last_verified": "2026-03-28"
|
|
207
|
-
}
|
|
208
|
-
]
|
|
209
|
-
}
|
|
1
|
+
{
|
|
2
|
+
"kb_meta": {
|
|
3
|
+
"name": "SafeBrowse vf incident response playbooks",
|
|
4
|
+
"version": "vf-final",
|
|
5
|
+
"generated_on": "2026-03-28",
|
|
6
|
+
"entry_count": 18,
|
|
7
|
+
"purpose": "Default response playbooks for containment, rollback, quarantine, and evidence capture."
|
|
8
|
+
},
|
|
9
|
+
"playbooks": [
|
|
10
|
+
{
|
|
11
|
+
"playbook_id": "IR-01",
|
|
12
|
+
"name": "block_and_replan_read_only",
|
|
13
|
+
"goal": "Contain suspected manipulation while allowing limited progress.",
|
|
14
|
+
"default_steps": "Set decision=REPLAN_READ_ONLY; preserve task envelope; do not allow new writable origins or sensitive sinks.",
|
|
15
|
+
"source_ids": [
|
|
16
|
+
"SRC_OPENAI_PROMPT_INJECTION_2026"
|
|
17
|
+
],
|
|
18
|
+
"credibility": "high",
|
|
19
|
+
"last_verified": "2026-03-28"
|
|
20
|
+
},
|
|
21
|
+
{
|
|
22
|
+
"playbook_id": "IR-02",
|
|
23
|
+
"name": "block_and_user_confirm",
|
|
24
|
+
"goal": "Require explicit user approval for a high-impact but possibly legitimate action.",
|
|
25
|
+
"default_steps": "Show structured action summary, source/target origins, and taint summary; execute only on explicit approval.",
|
|
26
|
+
"source_ids": [
|
|
27
|
+
"SRC_GOOGLE_CHROME_AGENTIC_2025"
|
|
28
|
+
],
|
|
29
|
+
"credibility": "high",
|
|
30
|
+
"last_verified": "2026-03-28"
|
|
31
|
+
},
|
|
32
|
+
{
|
|
33
|
+
"playbook_id": "IR-03",
|
|
34
|
+
"name": "quarantine_artifact",
|
|
35
|
+
"goal": "Isolate a suspicious document, viewer, or download for separate analysis.",
|
|
36
|
+
"default_steps": "Detach artifact from main planner context; preserve hashes, provenance, and screenshots/text extracts for review.",
|
|
37
|
+
"source_ids": [
|
|
38
|
+
"SRC_ANTHROPIC_BROWSER_USE_2025"
|
|
39
|
+
],
|
|
40
|
+
"credibility": "high",
|
|
41
|
+
"last_verified": "2026-03-28"
|
|
42
|
+
},
|
|
43
|
+
{
|
|
44
|
+
"playbook_id": "IR-04",
|
|
45
|
+
"name": "revoke_or_rotate_token",
|
|
46
|
+
"goal": "Revoke potentially misused credentials or down-scope active tokens.",
|
|
47
|
+
"default_steps": "Invalidate cached handles; trigger credential broker rotation; mark session for re-auth if needed.",
|
|
48
|
+
"source_ids": [
|
|
49
|
+
"SRC_MCP_SECURITY_BEST_PRACTICES_2025"
|
|
50
|
+
],
|
|
51
|
+
"credibility": "high",
|
|
52
|
+
"last_verified": "2026-03-28"
|
|
53
|
+
},
|
|
54
|
+
{
|
|
55
|
+
"playbook_id": "IR-05",
|
|
56
|
+
"name": "freeze_tool_inventory",
|
|
57
|
+
"goal": "Freeze tool list and block dynamic capability expansion after suspicious changes.",
|
|
58
|
+
"default_steps": "Disallow new tools/manifests until review; keep only previously approved tool set.",
|
|
59
|
+
"source_ids": [
|
|
60
|
+
"SRC_OWASP_SECURE_MCP_GUIDE_2026"
|
|
61
|
+
],
|
|
62
|
+
"credibility": "high",
|
|
63
|
+
"last_verified": "2026-03-28"
|
|
64
|
+
},
|
|
65
|
+
{
|
|
66
|
+
"playbook_id": "IR-06",
|
|
67
|
+
"name": "memory_snapshot_and_rollback",
|
|
68
|
+
"goal": "Restore durable memory to last known-good state after poisoning suspicion.",
|
|
69
|
+
"default_steps": "Take forensic snapshot, verify hash chain, roll back, and mark tainted interval as excluded from future retrieval.",
|
|
70
|
+
"source_ids": [
|
|
71
|
+
"SRC_OWASP_AGENT_MEMORY_GUARD_2026"
|
|
72
|
+
],
|
|
73
|
+
"credibility": "high",
|
|
74
|
+
"last_verified": "2026-03-28"
|
|
75
|
+
},
|
|
76
|
+
{
|
|
77
|
+
"playbook_id": "IR-07",
|
|
78
|
+
"name": "downgrade_session_mode",
|
|
79
|
+
"goal": "Move from normal or write-capable mode to read-only or extract-only mode.",
|
|
80
|
+
"default_steps": "Retain navigation/extraction, disable sends/uploads/mutations/exec and require approvals for re-escalation.",
|
|
81
|
+
"source_ids": [
|
|
82
|
+
"SRC_OPENAI_PROMPT_INJECTION_2026"
|
|
83
|
+
],
|
|
84
|
+
"credibility": "high",
|
|
85
|
+
"last_verified": "2026-03-28"
|
|
86
|
+
},
|
|
87
|
+
{
|
|
88
|
+
"playbook_id": "IR-08",
|
|
89
|
+
"name": "origin_pair_lockdown",
|
|
90
|
+
"goal": "Lock the session to currently approved origin pairs after anomaly detection.",
|
|
91
|
+
"default_steps": "No new source or sink origins; no cross-origin copy/paste outside explicit allowlist.",
|
|
92
|
+
"source_ids": [
|
|
93
|
+
"SRC_GOOGLE_CHROME_AGENTIC_2025"
|
|
94
|
+
],
|
|
95
|
+
"credibility": "high",
|
|
96
|
+
"last_verified": "2026-03-28"
|
|
97
|
+
},
|
|
98
|
+
{
|
|
99
|
+
"playbook_id": "IR-09",
|
|
100
|
+
"name": "sandbox_escalation",
|
|
101
|
+
"goal": "Move suspicious local helper/tool execution into a stricter sandbox profile.",
|
|
102
|
+
"default_steps": "Increase isolation, reduce filesystem/network access, and require additional approvals.",
|
|
103
|
+
"source_ids": [
|
|
104
|
+
"SRC_MCP_SECURITY_BEST_PRACTICES_2025"
|
|
105
|
+
],
|
|
106
|
+
"credibility": "high",
|
|
107
|
+
"last_verified": "2026-03-28"
|
|
108
|
+
},
|
|
109
|
+
{
|
|
110
|
+
"playbook_id": "IR-10",
|
|
111
|
+
"name": "ssrf_network_cutoff",
|
|
112
|
+
"goal": "Temporarily cut off metadata discovery or outbound fetches when SSRF indicators appear.",
|
|
113
|
+
"default_steps": "Deny discovery URLs, redirects, and private-range destinations until investigation completes.",
|
|
114
|
+
"source_ids": [
|
|
115
|
+
"SRC_MCP_SECURITY_BEST_PRACTICES_2025"
|
|
116
|
+
],
|
|
117
|
+
"credibility": "high",
|
|
118
|
+
"last_verified": "2026-03-28"
|
|
119
|
+
},
|
|
120
|
+
{
|
|
121
|
+
"playbook_id": "IR-11",
|
|
122
|
+
"name": "veto_retry_threshold",
|
|
123
|
+
"goal": "Escalate after repeated vetoes to avoid approval grinding.",
|
|
124
|
+
"default_steps": "After N blocked or near-identical retries, stop replanning and surface incident state to host/user.",
|
|
125
|
+
"source_ids": [
|
|
126
|
+
"SRC_NIST_HIJACK_EVAL_2025"
|
|
127
|
+
],
|
|
128
|
+
"credibility": "high",
|
|
129
|
+
"last_verified": "2026-03-28"
|
|
130
|
+
},
|
|
131
|
+
{
|
|
132
|
+
"playbook_id": "IR-12",
|
|
133
|
+
"name": "forensic_export_bundle",
|
|
134
|
+
"goal": "Export replayable evidence bundle for debugging or incident response.",
|
|
135
|
+
"default_steps": "Package decision log, hashes, provenance, traces, sanitized observations, and policy versions.",
|
|
136
|
+
"source_ids": [
|
|
137
|
+
"SRC_BROWSERGYM_GITHUB_2026"
|
|
138
|
+
],
|
|
139
|
+
"credibility": "high",
|
|
140
|
+
"last_verified": "2026-03-28"
|
|
141
|
+
},
|
|
142
|
+
{
|
|
143
|
+
"playbook_id": "IR-13",
|
|
144
|
+
"name": "tool_chain_isolation",
|
|
145
|
+
"goal": "Break cross-tool data flows after suspected poisoning in one tool output.",
|
|
146
|
+
"default_steps": "Stop automatic chaining; require explicit allowlist or user confirmation to pass outputs onward.",
|
|
147
|
+
"source_ids": [
|
|
148
|
+
"SRC_ACE_NDSS_2026"
|
|
149
|
+
],
|
|
150
|
+
"credibility": "high",
|
|
151
|
+
"last_verified": "2026-03-28"
|
|
152
|
+
},
|
|
153
|
+
{
|
|
154
|
+
"playbook_id": "IR-14",
|
|
155
|
+
"name": "cache_flush_and_partition",
|
|
156
|
+
"goal": "Flush or partition suspicious caches/vector stores after poisoning indicators.",
|
|
157
|
+
"default_steps": "Invalidate affected entries; separate tenants; reindex from trusted sources if needed.",
|
|
158
|
+
"source_ids": [
|
|
159
|
+
"SRC_REVPRAG_EMNLP_2025"
|
|
160
|
+
],
|
|
161
|
+
"credibility": "high",
|
|
162
|
+
"last_verified": "2026-03-28"
|
|
163
|
+
},
|
|
164
|
+
{
|
|
165
|
+
"playbook_id": "IR-15",
|
|
166
|
+
"name": "human_triage_required",
|
|
167
|
+
"goal": "Require operator review for regulated, destructive, or ambiguous cases.",
|
|
168
|
+
"default_steps": "Pause execution and surface structured context with recommended next safe step.",
|
|
169
|
+
"source_ids": [
|
|
170
|
+
"SRC_OWASP_AGENTIC_TOP10_2026"
|
|
171
|
+
],
|
|
172
|
+
"credibility": "high",
|
|
173
|
+
"last_verified": "2026-03-28"
|
|
174
|
+
},
|
|
175
|
+
{
|
|
176
|
+
"playbook_id": "IR-16",
|
|
177
|
+
"name": "policy_pack_fail_safe",
|
|
178
|
+
"goal": "Fall back to stricter default policy pack when pack integrity or confidence is uncertain.",
|
|
179
|
+
"default_steps": "Activate restrictive baseline pack with read-only defaults and disabled local execution.",
|
|
180
|
+
"source_ids": [
|
|
181
|
+
"SRC_OWASP_AGENTIC_TOP10_2026"
|
|
182
|
+
],
|
|
183
|
+
"credibility": "high",
|
|
184
|
+
"last_verified": "2026-03-28"
|
|
185
|
+
},
|
|
186
|
+
{
|
|
187
|
+
"playbook_id": "IR-17",
|
|
188
|
+
"name": "artifact_reprocess_with_dual_extractors",
|
|
189
|
+
"goal": "Reprocess suspicious artifact using independent extraction pipelines.",
|
|
190
|
+
"default_steps": "Compare render/text/OCR outputs; keep planner on hold until mismatch resolved.",
|
|
191
|
+
"source_ids": [
|
|
192
|
+
"SRC_IPI_DETECT_REMOVE_ACL_2025"
|
|
193
|
+
],
|
|
194
|
+
"credibility": "high",
|
|
195
|
+
"last_verified": "2026-03-28"
|
|
196
|
+
},
|
|
197
|
+
{
|
|
198
|
+
"playbook_id": "IR-18",
|
|
199
|
+
"name": "adaptive_red_team_capture",
|
|
200
|
+
"goal": "Save attack artifact into evaluation corpus for future regression and adaptive testing.",
|
|
201
|
+
"default_steps": "Tag with family/source/sink context; add to benchmark scenario queue.",
|
|
202
|
+
"source_ids": [
|
|
203
|
+
"SRC_NIST_HIJACK_EVAL_2025"
|
|
204
|
+
],
|
|
205
|
+
"credibility": "high",
|
|
206
|
+
"last_verified": "2026-03-28"
|
|
207
|
+
}
|
|
208
|
+
]
|
|
209
|
+
}
|