Cyber Offense
cyber-offenseriskPath: /knowledge-base/risks/cyber-offense/
E82Entity ID (EID)
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
"id": "cyber-offense",
"wikiId": "E82",
"path": "/knowledge-base/risks/cyber-offense/",
"filePath": "knowledge-base/risks/cyber-offense.mdx",
"title": "Cyber Offense",
"quality": 0,
"readerImportance": 16,
"researchImportance": 21.5,
"tacticalValue": null,
"contentFormat": "article",
"causalLevel": null,
"lastUpdated": "2026-04-25",
"dateCreated": "2026-02-20",
"summary": null,
"description": "AI-enhanced cyberattacks, offensive hacking capabilities, and the evolving offense-defense balance as AI systems accelerate threat actor operations",
"ratings": null,
"category": "risks",
"subcategory": "misuse",
"clusters": [
"ai-safety",
"cyber"
],
"metrics": {
"wordCount": 1695,
"tableCount": 2,
"diagramCount": 0,
"internalLinks": 15,
"externalLinks": 0,
"footnoteCount": 13,
"bulletRatio": 0,
"sectionCount": 6,
"hasOverview": true,
"structuralScore": 12
},
"suggestedQuality": 80,
"updateFrequency": null,
"evergreen": true,
"wordCount": 1695,
"unconvertedLinks": [],
"unconvertedLinkCount": 0,
"convertedLinkCount": 0,
"backlinkCount": 3,
"hallucinationRisk": {
"level": "medium",
"score": 40,
"factors": [
"low-quality-score",
"few-external-sources",
"moderately-cited"
]
},
"entityType": "risk",
"redundancy": {
"maxSimilarity": 17,
"similarPages": [
{
"id": "cyberweapons",
"title": "Cyberweapons",
"path": "/knowledge-base/risks/cyberweapons/",
"similarity": 17
},
{
"id": "misuse-risks",
"title": "AI Misuse Risk Cruxes",
"path": "/knowledge-base/cruxes/misuse-risks/",
"similarity": 15
},
{
"id": "cyberweapons-attack-automation",
"title": "Autonomous Cyber Attack Timeline",
"path": "/knowledge-base/models/cyberweapons-attack-automation/",
"similarity": 15
},
{
"id": "claude-code-espionage-2025",
"title": "Claude Code Espionage Incident (2025)",
"path": "/knowledge-base/incidents/claude-code-espionage-2025/",
"similarity": 14
},
{
"id": "cyberweapons-offense-defense",
"title": "Cyber Offense-Defense Balance Model",
"path": "/knowledge-base/models/cyberweapons-offense-defense/",
"similarity": 14
}
]
},
"coverage": {
"passing": 4,
"total": 13,
"targets": {
"tables": 7,
"diagrams": 1,
"internalLinks": 14,
"externalLinks": 8,
"footnotes": 5,
"references": 5
},
"actuals": {
"tables": 2,
"diagrams": 0,
"internalLinks": 15,
"externalLinks": 0,
"footnotes": 13,
"references": 0,
"quotesWithQuotes": 0,
"quotesTotal": 0,
"accuracyChecked": 0,
"accuracyTotal": 0
},
"items": {
"summary": "red",
"schedule": "red",
"entity": "green",
"editHistory": "red",
"overview": "green",
"tables": "amber",
"diagrams": "red",
"internalLinks": "green",
"externalLinks": "red",
"footnotes": "green",
"references": "red",
"quotes": "red",
"accuracy": "red"
}
},
"readerRank": 546,
"researchRank": 474,
"recommendedScore": 29.45
}External Links
No external links
Backlinks (3)
| id | title | type | relationship |
|---|---|---|---|
| metr | METR | organization | — |
| ai-cyber-damage-bounding-tail | AI Cyber Damage: Bounding the Tail | analysis | — |
| near-term-risks | Key Near-Term AI Risks | risk | — |