Autonomous Cyber Attack Timeline
cyberweapons-attack-automationanalysisPath: /knowledge-base/models/cyberweapons-attack-automation/
E87Entity ID (EID)
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
"id": "cyberweapons-attack-automation",
"numericId": null,
"path": "/knowledge-base/models/cyberweapons-attack-automation/",
"filePath": "knowledge-base/models/cyberweapons-attack-automation.mdx",
"title": "Autonomous Cyber Attack Timeline",
"quality": 63,
"readerImportance": 72,
"researchImportance": 79.5,
"tacticalValue": null,
"contentFormat": "article",
"tractability": null,
"neglectedness": null,
"uncertainty": null,
"causalLevel": null,
"lastUpdated": "2026-03-13",
"dateCreated": "2026-02-15",
"llmSummary": "This model projects AI achieving fully autonomous cyber attack capability (Level 4) by 2029-2033, with current systems at ~50% progress and Level 3 attacks already documented in September 2025. Projects \\$3-5T annual losses at Level 4, with defense currently underfunded by 3-10x relative to offensive investment.",
"description": "This model projects when AI achieves autonomous cyber attack capability across a 5-level spectrum. Current assessment shows ~50% progress toward full autonomy, with Level 3 attacks already documented and Level 4 projected by 2029-2033 based on capability analysis of reconnaissance, exploitation, and persistence requirements.",
"ratings": {
"focus": 8.5,
"novelty": 6,
"rigor": 5.5,
"completeness": 7.5,
"concreteness": 7,
"actionability": 6.5
},
"category": "models",
"subcategory": "domain-models",
"clusters": [
"ai-safety",
"cyber"
],
"metrics": {
"wordCount": 1679,
"tableCount": 11,
"diagramCount": 0,
"internalLinks": 47,
"externalLinks": 0,
"footnoteCount": 0,
"bulletRatio": 0.33,
"sectionCount": 28,
"hasOverview": true,
"structuralScore": 10
},
"suggestedQuality": 67,
"updateFrequency": 90,
"evergreen": true,
"wordCount": 1679,
"unconvertedLinks": [],
"unconvertedLinkCount": 0,
"convertedLinkCount": 35,
"backlinkCount": 3,
"hallucinationRisk": {
"level": "medium",
"score": 60,
"factors": [
"no-citations",
"few-external-sources"
]
},
"entityType": "analysis",
"redundancy": {
"maxSimilarity": 16,
"similarPages": [
{
"id": "cyberweapons-offense-defense",
"title": "Cyber Offense-Defense Balance Model",
"path": "/knowledge-base/models/cyberweapons-offense-defense/",
"similarity": 16
},
{
"id": "agi-development",
"title": "AGI Development",
"path": "/knowledge-base/forecasting/agi-development/",
"similarity": 14
},
{
"id": "cyberweapons",
"title": "Cyberweapons",
"path": "/knowledge-base/risks/cyberweapons/",
"similarity": 14
},
{
"id": "coding",
"title": "Autonomous Coding",
"path": "/knowledge-base/capabilities/coding/",
"similarity": 13
},
{
"id": "corrigibility-failure-pathways",
"title": "Corrigibility Failure Pathways",
"path": "/knowledge-base/models/corrigibility-failure-pathways/",
"similarity": 13
}
]
},
"coverage": {
"passing": 7,
"total": 13,
"targets": {
"tables": 7,
"diagrams": 1,
"internalLinks": 13,
"externalLinks": 8,
"footnotes": 5,
"references": 5
},
"actuals": {
"tables": 11,
"diagrams": 0,
"internalLinks": 47,
"externalLinks": 0,
"footnotes": 0,
"references": 31,
"quotesWithQuotes": 0,
"quotesTotal": 0,
"accuracyChecked": 0,
"accuracyTotal": 0
},
"items": {
"llmSummary": "green",
"schedule": "green",
"entity": "green",
"editHistory": "red",
"overview": "green",
"tables": "green",
"diagrams": "red",
"internalLinks": "green",
"externalLinks": "red",
"footnotes": "red",
"references": "green",
"quotes": "red",
"accuracy": "red"
},
"ratingsString": "N:6 R:5.5 A:6.5 C:7.5"
},
"readerRank": 152,
"researchRank": 92,
"recommendedScore": 183.58
}External Links
No external links
Backlinks (3)
| id | title | type | relationship |
|---|---|---|---|
| cyberweapons-offense-defense | Cyber Offense-Defense Balance Model | analysis | — |
| risk-activation-timeline | Risk Activation Timeline Model | analysis | — |
| risk-interaction-matrix | Risk Interaction Matrix Model | analysis | — |