Skip to content
Longterm Wiki

Cyber Offense

cyber-offenseriskPath: /knowledge-base/risks/cyber-offense/
E82Entity ID (EID)
← Back to page3 backlinksQuality: 0Updated: 2026-04-25
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
  "id": "cyber-offense",
  "wikiId": "E82",
  "path": "/knowledge-base/risks/cyber-offense/",
  "filePath": "knowledge-base/risks/cyber-offense.mdx",
  "title": "Cyber Offense",
  "quality": 0,
  "readerImportance": 16,
  "researchImportance": 21.5,
  "tacticalValue": null,
  "contentFormat": "article",
  "causalLevel": null,
  "lastUpdated": "2026-04-25",
  "dateCreated": "2026-02-20",
  "summary": null,
  "description": "AI-enhanced cyberattacks, offensive hacking capabilities, and the evolving offense-defense balance as AI systems accelerate threat actor operations",
  "ratings": null,
  "category": "risks",
  "subcategory": "misuse",
  "clusters": [
    "ai-safety",
    "cyber"
  ],
  "metrics": {
    "wordCount": 1695,
    "tableCount": 2,
    "diagramCount": 0,
    "internalLinks": 15,
    "externalLinks": 0,
    "footnoteCount": 13,
    "bulletRatio": 0,
    "sectionCount": 6,
    "hasOverview": true,
    "structuralScore": 12
  },
  "suggestedQuality": 80,
  "updateFrequency": null,
  "evergreen": true,
  "wordCount": 1695,
  "unconvertedLinks": [],
  "unconvertedLinkCount": 0,
  "convertedLinkCount": 0,
  "backlinkCount": 3,
  "hallucinationRisk": {
    "level": "medium",
    "score": 40,
    "factors": [
      "low-quality-score",
      "few-external-sources",
      "moderately-cited"
    ]
  },
  "entityType": "risk",
  "redundancy": {
    "maxSimilarity": 17,
    "similarPages": [
      {
        "id": "cyberweapons",
        "title": "Cyberweapons",
        "path": "/knowledge-base/risks/cyberweapons/",
        "similarity": 17
      },
      {
        "id": "misuse-risks",
        "title": "AI Misuse Risk Cruxes",
        "path": "/knowledge-base/cruxes/misuse-risks/",
        "similarity": 15
      },
      {
        "id": "cyberweapons-attack-automation",
        "title": "Autonomous Cyber Attack Timeline",
        "path": "/knowledge-base/models/cyberweapons-attack-automation/",
        "similarity": 15
      },
      {
        "id": "claude-code-espionage-2025",
        "title": "Claude Code Espionage Incident (2025)",
        "path": "/knowledge-base/incidents/claude-code-espionage-2025/",
        "similarity": 14
      },
      {
        "id": "cyberweapons-offense-defense",
        "title": "Cyber Offense-Defense Balance Model",
        "path": "/knowledge-base/models/cyberweapons-offense-defense/",
        "similarity": 14
      }
    ]
  },
  "coverage": {
    "passing": 4,
    "total": 13,
    "targets": {
      "tables": 7,
      "diagrams": 1,
      "internalLinks": 14,
      "externalLinks": 8,
      "footnotes": 5,
      "references": 5
    },
    "actuals": {
      "tables": 2,
      "diagrams": 0,
      "internalLinks": 15,
      "externalLinks": 0,
      "footnotes": 13,
      "references": 0,
      "quotesWithQuotes": 0,
      "quotesTotal": 0,
      "accuracyChecked": 0,
      "accuracyTotal": 0
    },
    "items": {
      "summary": "red",
      "schedule": "red",
      "entity": "green",
      "editHistory": "red",
      "overview": "green",
      "tables": "amber",
      "diagrams": "red",
      "internalLinks": "green",
      "externalLinks": "red",
      "footnotes": "green",
      "references": "red",
      "quotes": "red",
      "accuracy": "red"
    }
  },
  "readerRank": 546,
  "researchRank": 474,
  "recommendedScore": 29.45
}
External Links

No external links

Backlinks (3)
idtitletyperelationship
metrMETRorganization
ai-cyber-damage-bounding-tailAI Cyber Damage: Bounding the Tailanalysis
near-term-risksKey Near-Term AI Risksrisk
Longterm Wiki