Catastrophic Cyber Tail Risk
catastrophic-cyber-tail-riskriskPath: /knowledge-base/risks/catastrophic-cyber-tail-risk/
E2519Entity ID (EID)
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
"id": "catastrophic-cyber-tail-risk",
"wikiId": "E2519",
"path": "/knowledge-base/risks/catastrophic-cyber-tail-risk/",
"filePath": "knowledge-base/risks/catastrophic-cyber-tail-risk.mdx",
"title": "Catastrophic Cyber Tail Risk",
"quality": null,
"readerImportance": null,
"researchImportance": null,
"tacticalValue": null,
"contentFormat": "article",
"causalLevel": null,
"lastUpdated": "2026-04-25",
"dateCreated": "2026-04-25",
"summary": null,
"description": "Catalog of systemic single points of failure in cyber infrastructure that could plausibly produce \\$1T+ damage events. Treats which catastrophic cyber scenarios are reachable and which are bounded by structural features of the affected systems.",
"ratings": null,
"category": "risks",
"subcategory": "structural",
"clusters": [
"cyber",
"ai-safety"
],
"metrics": {
"wordCount": 1876,
"tableCount": 1,
"diagramCount": 0,
"internalLinks": 10,
"externalLinks": 14,
"footnoteCount": 1,
"bulletRatio": 0.21,
"sectionCount": 14,
"hasOverview": true,
"structuralScore": 13
},
"suggestedQuality": 87,
"updateFrequency": null,
"evergreen": true,
"wordCount": 1876,
"unconvertedLinks": [
{
"text": "performing 80-90% of tactical operations autonomously and generating multiple requests per second",
"url": "https://www.anthropic.com/news/disrupting-AI-espionage",
"resourceId": "4ba107b71a0707f9",
"resourceTitle": "first documented AI-orchestrated cyberattack"
},
{
"text": "\"Disrupting the first reported AI-orchestrated cyber espionage campaign\"",
"url": "https://www.anthropic.com/news/disrupting-AI-espionage",
"resourceId": "4ba107b71a0707f9",
"resourceTitle": "first documented AI-orchestrated cyberattack"
}
],
"unconvertedLinkCount": 2,
"convertedLinkCount": 0,
"backlinkCount": 1,
"hallucinationRisk": {
"level": "medium",
"score": 50,
"factors": [
"low-citation-density"
]
},
"entityType": "risk",
"redundancy": {
"maxSimilarity": 20,
"similarPages": [
{
"id": "ai-cyber-damage-bounding-tail",
"title": "AI Cyber Damage: Bounding the Tail",
"path": "/knowledge-base/models/ai-cyber-damage-bounding-tail/",
"similarity": 20
},
{
"id": "concentrated-compute-cybersecurity-risk",
"title": "Concentrated Compute as a Cybersecurity Risk",
"path": "/knowledge-base/risks/concentrated-compute-cybersecurity-risk/",
"similarity": 15
},
{
"id": "cyberweapons",
"title": "Cyberweapons",
"path": "/knowledge-base/risks/cyberweapons/",
"similarity": 13
},
{
"id": "ai-cyber-damage-estimates",
"title": "AI Cyber Damage Estimates",
"path": "/knowledge-base/models/ai-cyber-damage-estimates/",
"similarity": 12
},
{
"id": "compute-concentration",
"title": "Compute Concentration",
"path": "/knowledge-base/risks/compute-concentration/",
"similarity": 12
}
]
},
"coverage": {
"passing": 3,
"total": 13,
"targets": {
"tables": 8,
"diagrams": 1,
"internalLinks": 15,
"externalLinks": 9,
"footnotes": 6,
"references": 6
},
"actuals": {
"tables": 1,
"diagrams": 0,
"internalLinks": 10,
"externalLinks": 14,
"footnotes": 1,
"references": 1,
"quotesWithQuotes": 0,
"quotesTotal": 0,
"accuracyChecked": 0,
"accuracyTotal": 0
},
"items": {
"summary": "red",
"schedule": "red",
"entity": "green",
"editHistory": "red",
"overview": "green",
"tables": "amber",
"diagrams": "red",
"internalLinks": "amber",
"externalLinks": "green",
"footnotes": "amber",
"references": "amber",
"quotes": "red",
"accuracy": "red"
}
},
"recommendedScore": 21.62
}External Links
No external links
Backlinks (1)
| id | title | type | relationship |
|---|---|---|---|
| ai-cyber-damage-bounding-tail | AI Cyber Damage: Bounding the Tail | analysis | related |