security-requirement-extraction
Sécurité & ConformitéDerive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.
Documentation
Security Requirement Extraction
Transform threat analysis into actionable security requirements.
Use this skill when
Do not use this skill when
Instructions
resources/implementation-playbook.md.Resources
resources/implementation-playbook.md for detailed patterns and examples.Compétences similaires
Explorez d'autres agents de la catégorie Sécurité & Conformité
azure-keyvault-keys-rust
|
Wireshark Network Traffic Analysis
This skill should be used when the user asks to "analyze network traffic with Wireshark", "capture packets for troubleshooting", "filter PCAP files", "follow TCP/UDP streams", "detect network anomalies", "investigate suspicious traffic", or "perform protocol analysis". It provides comprehensive techniques for network packet capture, filtering, and analysis using Wireshark.
security-scanning-security-hardening
"Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls."