vulnerability-discovery
Systematic vulnerability finding, threat modeling, and attack surface analysis for AI/LLM security assessments
vulnerability-scanningthreat-modelingattack-surface-mappingAI-security
pluginagentmarketplace
1
security-threat-model
Use when designing or reviewing systems handling sensitive data (PII, PHI, financial, auth credentials), building features with security implications (auth, payments, file uploads, APIs), preparing for security audits or compliance (PCI, HIPAA, SOC 2), investigating security incidents, integrating third-party services, or when user mentions "threat model", "security architecture", "STRIDE", "trust boundaries", "attack surface", or "security review".
threat-modelingattack-surface-mappingrisk-assessmentcompliance-audit
lyndonkl
82
vulnerability-scanner
Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.
vulnerability-scanningowaspsupply-chain-securityattack-surface-mapping
xenitV1
10917