II.
SkillArea JSON
Structured · liveskill-area:penetration-testing-ethical-hacking
Penetration Testing and Ethical Hacking json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "skill-area:penetration-testing-ethical-hacking",
"_kind": "SkillArea",
"_file": "domain/skill-areas/curated-domain-task-skill-areas.yaml",
"_cluster": "domain",
"attributes": {
"displayName": "Penetration Testing and Ethical Hacking",
"description": "Conducting offensive security assessments - recon, exploit chaining,\nevidence capture, reporting, and safe execution boundaries.\n",
"domains": [
"domain:cybersecurity",
"specialization:security-research"
],
"expertiseLevels": [
"expert"
]
},
"outgoingEdges": [
{
"from": "skill-area:penetration-testing-ethical-hacking",
"to": "domain:cybersecurity",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:penetration-testing-ethical-hacking",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "secondary"
}
},
{
"from": "skill-area:penetration-testing-ethical-hacking",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area"
}
],
"incomingEdges": [
{
"from": "skill-area:application-security",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "prerequisite_for_learning",
"attributes": {
"strength": "recommended"
}
},
{
"from": "lib-agent:cryptography-blockchain--solidity-auditor",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 0.5
}
},
{
"from": "lib-agent:security-research--cloud-security-researcher",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--ctf-creator",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--exploit-developer",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--hardware-security-researcher",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--mobile-researcher",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--purple-team-coordinator",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--red-team-operator",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--reverse-engineer",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--binary-exploitation",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--cloud-security-testing",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--debugger-integration",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--ghidra-ida-re",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--hardware-security",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--mitre-attack",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--mobile-security",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--offensive-security",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--protocol-analysis",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--pwntools-exploit",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "role:penetration-tester",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "requires_expertise",
"attributes": {}
},
{
"from": "role:red-team-lead",
"to": "skill-area:penetration-testing-ethical-hacking",
"kind": "requires_expertise",
"attributes": {}
}
]
}