attack-tree-construction
Sécurité & ConformitéBuild comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.
Documentation
Attack Tree Construction
Systematic attack path visualization and analysis.
Use this skill when
Do not use this skill when
Instructions
resources/implementation-playbook.md.Safety
Resources
resources/implementation-playbook.md for detailed patterns, templates, and examples.Compétences similaires
Explorez d'autres agents de la catégorie Sécurité & Conformité
backend-security-coder
Expert in secure backend coding practices specializing in input
SQL Injection Testing
This skill should be used when the user asks to "test for SQL injection vulnerabilities", "perform SQLi attacks", "bypass authentication using SQL injection", "extract database information through injection", "detect SQL injection flaws", or "exploit database query vulnerabilities". It provides comprehensive techniques for identifying, exploiting, and understanding SQL injection attack vectors across different database systems.
api-security-best-practices
"Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities"