II.
SkillArea JSON
Structured · liveskill-area:threat-modeling
Threat Modeling json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "skill-area:threat-modeling",
"_kind": "SkillArea",
"_file": "domain/skill-areas/skill-areas-security.yaml",
"_cluster": "domain",
"attributes": {
"displayName": "Threat Modeling",
"description": "STRIDE / PASTA / attack-tree threat modeling against system\ndesigns, with prioritized mitigations and abuse cases.\n",
"domains": [
"specialization:security-research"
],
"expertiseLevels": [
"intermediate",
"expert"
]
},
"outgoingEdges": [
{
"from": "skill-area:threat-modeling",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
}
],
"incomingEdges": [
{
"from": "skill-area:penetration-testing-ethical-hacking",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area"
},
{
"from": "skill-area:application-security",
"to": "skill-area:threat-modeling",
"kind": "prerequisite_for_learning",
"attributes": {
"strength": "recommended"
}
},
{
"from": "skill:security-review",
"to": "skill-area:threat-modeling",
"kind": "addresses",
"attributes": {}
},
{
"from": "lib-agent:biomedical-engineering--cybersecurity-specialist",
"to": "skill-area:threat-modeling",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-compliance--security-architecture-reviewer-agent",
"to": "skill-area:threat-modeling",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-compliance--threat-modeling-agent",
"to": "skill-area:threat-modeling",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:software-architecture--security-architect",
"to": "skill-area:threat-modeling",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:software-architecture--threat-modeler",
"to": "skill-area:threat-modeling",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:software-architecture--security-architecture-review",
"to": "skill-area:threat-modeling",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:biomedical-engineering--cybersecurity-risk-assessor",
"to": "skill-area:threat-modeling",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:software-architecture--threat-modeler",
"to": "skill-area:threat-modeling",
"kind": "lib_requires_skill_area",
"attributes": {
"weight": 1
}
},
{
"from": "responsibility:security-review",
"to": "skill-area:threat-modeling",
"kind": "requires_expertise",
"attributes": {}
},
{
"from": "responsibility:threat-modeling",
"to": "skill-area:threat-modeling",
"kind": "requires_expertise",
"attributes": {}
},
{
"from": "role:security-engineer",
"to": "skill-area:threat-modeling",
"kind": "requires_expertise",
"attributes": {}
},
{
"from": "role:security-architect",
"to": "skill-area:threat-modeling",
"kind": "requires_expertise",
"attributes": {}
},
{
"from": "role:appsec-engineer",
"to": "skill-area:threat-modeling",
"kind": "requires_expertise",
"attributes": {}
},
{
"from": "role:chief-security-officer",
"to": "skill-area:threat-modeling",
"kind": "requires_expertise",
"attributes": {}
},
{
"from": "role:security-reviewer",
"to": "skill-area:threat-modeling",
"kind": "requires_expertise",
"attributes": {}
},
{
"from": "workflow:vehicle-cybersecurity-assessment",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:hazop-safety-analysis",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:product-risk-analysis",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:product-launch-readiness",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:compliance-technology-stack-audit",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:ai-powered-product-feature-review",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:vendor-onboarding",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:annual-compliance-review",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:cyber-risk-scenario-modeling",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:threat-intelligence-feed-review",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:penetration-testing",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:vendor-evaluation-extended",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:workplace-safety-audit",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:enterprise-risk-register-review",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:third-party-risk-assessment",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:regulatory-change-management",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:due-diligence-deep-dive",
"to": "skill-area:threat-modeling",
"kind": "requires_skill_area",
"attributes": {}
}
]
}