Agentic AI Atlasby a5c.ai
OverviewWikiGraphFor AgentsEdgesSearchWorkspace
/
GitHubDocsDiscord
iiRecord
Agentic AI Atlas · Threat Modeling
skill-area:threat-modelinga5c.ai
Search record views/
Record · tabs

Available views

II.Record viewspp. 1 - 1
overviewjsongraph
II.
SkillArea JSON

skill-area:threat-modeling

Structured · live

Threat Modeling json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · domain/skill-areas/skill-areas-security.yamlCluster · domain
Record JSON
{
  "id": "skill-area:threat-modeling",
  "_kind": "SkillArea",
  "_file": "domain/skill-areas/skill-areas-security.yaml",
  "_cluster": "domain",
  "attributes": {
    "displayName": "Threat Modeling",
    "description": "STRIDE / PASTA / attack-tree threat modeling against system\ndesigns, with prioritized mitigations and abuse cases.\n",
    "domains": [
      "specialization:security-research"
    ],
    "expertiseLevels": [
      "intermediate",
      "expert"
    ]
  },
  "outgoingEdges": [
    {
      "from": "skill-area:threat-modeling",
      "to": "specialization:security-research",
      "kind": "applies_to",
      "attributes": {
        "confidence": "primary"
      }
    }
  ],
  "incomingEdges": [
    {
      "from": "skill-area:penetration-testing-ethical-hacking",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area"
    },
    {
      "from": "skill-area:application-security",
      "to": "skill-area:threat-modeling",
      "kind": "prerequisite_for_learning",
      "attributes": {
        "strength": "recommended"
      }
    },
    {
      "from": "skill:security-review",
      "to": "skill-area:threat-modeling",
      "kind": "addresses",
      "attributes": {}
    },
    {
      "from": "lib-agent:biomedical-engineering--cybersecurity-specialist",
      "to": "skill-area:threat-modeling",
      "kind": "lib_requires_skill_area",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-compliance--security-architecture-reviewer-agent",
      "to": "skill-area:threat-modeling",
      "kind": "lib_requires_skill_area",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-compliance--threat-modeling-agent",
      "to": "skill-area:threat-modeling",
      "kind": "lib_requires_skill_area",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:software-architecture--security-architect",
      "to": "skill-area:threat-modeling",
      "kind": "lib_requires_skill_area",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:software-architecture--threat-modeler",
      "to": "skill-area:threat-modeling",
      "kind": "lib_requires_skill_area",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:software-architecture--security-architecture-review",
      "to": "skill-area:threat-modeling",
      "kind": "lib_requires_skill_area",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-skill:biomedical-engineering--cybersecurity-risk-assessor",
      "to": "skill-area:threat-modeling",
      "kind": "lib_requires_skill_area",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-skill:software-architecture--threat-modeler",
      "to": "skill-area:threat-modeling",
      "kind": "lib_requires_skill_area",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "responsibility:security-review",
      "to": "skill-area:threat-modeling",
      "kind": "requires_expertise",
      "attributes": {}
    },
    {
      "from": "responsibility:threat-modeling",
      "to": "skill-area:threat-modeling",
      "kind": "requires_expertise",
      "attributes": {}
    },
    {
      "from": "role:security-engineer",
      "to": "skill-area:threat-modeling",
      "kind": "requires_expertise",
      "attributes": {}
    },
    {
      "from": "role:security-architect",
      "to": "skill-area:threat-modeling",
      "kind": "requires_expertise",
      "attributes": {}
    },
    {
      "from": "role:appsec-engineer",
      "to": "skill-area:threat-modeling",
      "kind": "requires_expertise",
      "attributes": {}
    },
    {
      "from": "role:chief-security-officer",
      "to": "skill-area:threat-modeling",
      "kind": "requires_expertise",
      "attributes": {}
    },
    {
      "from": "role:security-reviewer",
      "to": "skill-area:threat-modeling",
      "kind": "requires_expertise",
      "attributes": {}
    },
    {
      "from": "workflow:vehicle-cybersecurity-assessment",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:hazop-safety-analysis",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:product-risk-analysis",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:product-launch-readiness",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:compliance-technology-stack-audit",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:ai-powered-product-feature-review",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:vendor-onboarding",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:annual-compliance-review",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:cyber-risk-scenario-modeling",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:threat-intelligence-feed-review",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:penetration-testing",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:vendor-evaluation-extended",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:workplace-safety-audit",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:enterprise-risk-register-review",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:third-party-risk-assessment",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:regulatory-change-management",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:due-diligence-deep-dive",
      "to": "skill-area:threat-modeling",
      "kind": "requires_skill_area",
      "attributes": {}
    }
  ]
}

Shortcuts

Back to overview
Open graph tab