iiRecord
Agentic AI Atlas · responsibility:security-audit
responsibility:security-audita5c.ai
II.
Responsibility JSON

responsibility:security-audit

Structured · live

responsibility:security-audit json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · domain/products/krate-connectivity.yamlCluster · domain
Record JSON
{
  "id": "responsibility:security-audit",
  "_kind": "Responsibility",
  "_file": "domain/products/krate-connectivity.yaml",
  "_cluster": "domain",
  "attributes": {},
  "outgoingEdges": [
    {
      "from": "responsibility:security-audit",
      "to": "platform:krate",
      "kind": "applies_to",
      "attributes": {
        "notes": "Security audits cover Krate RBAC, policy profiles, and agent permissions"
      }
    }
  ],
  "incomingEdges": [
    {
      "from": "role:compliance-engineer",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:blockchain-engineer",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:compliance-officer",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:privacy-engineer",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:audit-analyst",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:security-engineer",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "workflow:dependency-update",
      "to": "responsibility:security-audit",
      "kind": "triggers_responsibility"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "responsibility:security-audit",
      "kind": "triggers_responsibility"
    },
    {
      "from": "workflow:security-audit",
      "to": "responsibility:security-audit",
      "kind": "triggers_responsibility"
    },
    {
      "from": "workflow:penetration-testing-cycle",
      "to": "responsibility:security-audit",
      "kind": "triggers_responsibility"
    },
    {
      "from": "role:kernel-developer",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:penetration-tester",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:security-architect",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:forensic-analyst",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:red-team-lead",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:DevSecOps-engineer",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:chief-security-officer",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:security-reviewer",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:vulnerability-scanner",
      "to": "responsibility:security-audit",
      "kind": "holds_responsibility"
    },
    {
      "from": "workflow:penetration-testing",
      "to": "responsibility:security-audit",
      "kind": "triggers_responsibility",
      "attributes": {}
    }
  ]
}