attack-tree-construction
Sécurité & ConformitéBuild comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.
Documentation
Attack Tree Construction
Systematic attack path visualization and analysis.
Use this skill when
Do not use this skill when
Instructions
resources/implementation-playbook.md.Safety
Resources
resources/implementation-playbook.md for detailed patterns, templates, and examples.Compétences similaires
Explorez d'autres agents de la catégorie Sécurité & Conformité
on-call-handoff-patterns
Master on-call shift handoffs with context transfer, escalation procedures, and documentation. Use when transitioning on-call responsibilities, documenting shift summaries, or improving on-call processes.
Shodan Reconnaissance and Pentesting
This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with Shodan," or "discover IoT devices and open ports." It provides comprehensive guidance for using Shodan's search engine, CLI, and API for penetration testing reconnaissance.
auth-implementation-patterns
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.