Agentic AI Atlasby a5c.ai
OverviewWikiGraphFor AgentsEdgesSearchWorkspace
/
GitHubDocsDiscord
iiRecord
Agentic AI Atlas · workflow:vulnerability-management
workflow:vulnerability-managementa5c.ai
Search record views/
Record · tabs

Available views

II.Record viewspp. 1 - 1
overviewjsongraph
II.
Workflow JSON

workflow:vulnerability-management

Structured · live

workflow:vulnerability-management json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · domain/products/krate-connectivity.yamlCluster · domain
Record JSON
{
  "id": "workflow:vulnerability-management",
  "_kind": "Workflow",
  "_file": "domain/products/krate-connectivity.yaml",
  "_cluster": "domain",
  "attributes": {},
  "outgoingEdges": [
    {
      "from": "workflow:vulnerability-management",
      "to": "platform:krate",
      "kind": "integrates_with",
      "attributes": {
        "notes": "Vulnerability remediation dispatches agents to patch repos on Krate"
      }
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "role:security-engineer",
      "kind": "involves_role"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "role:devops-engineer",
      "kind": "involves_role"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "role:platform-engineer",
      "kind": "involves_role"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "role:backend-engineer",
      "kind": "involves_role"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "role:compliance-officer",
      "kind": "involves_role"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "domain:cybersecurity",
      "kind": "applies_to_domain"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "domain:devops",
      "kind": "applies_to_domain"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "domain:cloud-infra",
      "kind": "applies_to_domain"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "responsibility:security-audit",
      "kind": "triggers_responsibility"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "responsibility:risk-assessment",
      "kind": "triggers_responsibility"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "responsibility:compliance-monitoring",
      "kind": "triggers_responsibility"
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "role:vulnerability-scanner",
      "kind": "involves_role",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "role:security-reviewer",
      "kind": "involves_role",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "role:dependency-updater",
      "kind": "involves_role",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "skill-area:secrets-rotation",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "domain:cybersecurity",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "domain:security",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "responsibility:run-security-scans",
      "kind": "triggers_responsibility",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "responsibility:upgrade-dependencies-weekly",
      "kind": "triggers_responsibility",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "org-unit:security-team",
      "kind": "performed_by_org_unit",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "org-unit:engineering",
      "kind": "performed_by_org_unit",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "org-unit:application-security-team",
      "kind": "performed_by_org_unit",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "role:vulnerability-scanner",
      "kind": "involves_role",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "role:security-reviewer",
      "kind": "involves_role",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "role:dependency-updater",
      "kind": "involves_role",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "skill-area:secrets-rotation",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "domain:cybersecurity",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "domain:security",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "responsibility:run-security-scans",
      "kind": "triggers_responsibility",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "responsibility:upgrade-dependencies-weekly",
      "kind": "triggers_responsibility",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "org-unit:security-team",
      "kind": "performed_by_org_unit",
      "attributes": {}
    },
    {
      "from": "workflow:vulnerability-management",
      "to": "org-unit:engineering",
      "kind": "performed_by_org_unit",
      "attributes": {}
    }
  ],
  "incomingEdges": [
    {
      "from": "stack-profile:vulnerability-management-platform",
      "to": "workflow:vulnerability-management",
      "kind": "follows_workflow"
    },
    {
      "from": "tool-server:mcp-snyk",
      "to": "workflow:vulnerability-management",
      "kind": "supports_work",
      "attributes": {
        "confidence": "high",
        "evidence": "Findings, severity, and remediation metadata project vulnerability workflows."
      }
    },
    {
      "from": "tool-server:mcp-sonarqube",
      "to": "workflow:vulnerability-management",
      "kind": "supports_work",
      "attributes": {
        "confidence": "medium",
        "evidence": "Security hotspots and code smells feed remediation workflows."
      }
    },
    {
      "from": "tool-server:mcp-wiz-candidate",
      "to": "workflow:vulnerability-management",
      "kind": "supports_work",
      "attributes": {
        "confidence": "medium",
        "evidence": "CNAPP findings are relevant inputs to vulnerability-management workflows."
      }
    },
    {
      "from": "lib-agent:security-compliance--forensic-analysis-agent",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-compliance--incident-triage-agent",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-compliance--patch-management-agent",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-compliance--remediation-guidance-agent",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-compliance--risk-scoring-agent",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-compliance--threat-intelligence-agent",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-compliance--vulnerability-triage-agent",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-research--cloud-security-researcher",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-agent:security-research--exploit-developer",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-agent:security-research--fuzzing-engineer",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-agent:security-research--hardware-security-researcher",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-agent:security-research--malware-analyst",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-research--mobile-researcher",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-agent:security-research--purple-team-coordinator",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-agent:security-research--red-team-operator",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-agent:security-research--reverse-engineer",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-agent:security-research--security-report-writer",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-research--smart-contract-auditor",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-agent:security-research--threat-intel-analyst",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-research--vuln-researcher",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-agent:security-research--web-security-researcher",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-process:cryptography-blockchain--smart-contract-security-audit",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:automotive-engineering--cybersecurity-engineering",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:gpu-programming--reduction-scan-implementation",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:research--novelties-scanner",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--business-continuity",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--codebase-security-audit",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--container-security",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--dast-process",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--data-classification",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--disaster-recovery-testing",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-process:security-compliance--encryption-standards",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--gdpr-compliance",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--hipaa-compliance",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--iac-security-review",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--iam-access-control",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--iso27001-implementation",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--nation-state-trojan-detection",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--pci-dss-compliance",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--penetration-testing",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-process:security-compliance--sast-pipeline",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-process:security-compliance--sca-dependency-management",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--secrets-management",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--security-logging-monitoring",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--security-policies",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--security-training",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--soc2-compliance",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--stride-threat-modeling",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--third-party-risk",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--vulnerability-management",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--ai-ml-security-research",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--api-security-research",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--binary-reverse-engineering",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--bug-bounty-workflow",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--capture-the-flag-challenges",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--cloud-security-research",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--container-security-research",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--dynamic-analysis-runtime-testing",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--exploit-development",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--firmware-analysis",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--fuzzing-campaign",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--hardware-security-research",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--malware-analysis",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--mobile-app-security-research",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--network-penetration-testing",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--protocol-reverse-engineering",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--purple-team-exercise",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--red-team-operations",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--responsible-disclosure",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--security-advisory-writing",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--security-research-lab-setup",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--security-research-publication",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--security-tool-development",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--shellcode-development",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--smart-contract-auditing",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--static-code-analysis",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--supply-chain-security",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--threat-intelligence-research",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--variant-analysis",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--vulnerability-research-workflow",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--vulnerability-root-cause-analysis",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-research--web-app-vuln-research",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-skill:security-compliance--aws-security-scanner",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-compliance--azure-security-scanner",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-compliance--container-security-scanner",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-skill:security-compliance--dast-scanner",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-skill:security-compliance--dependency-scanner",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-compliance--gcp-security-scanner",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-compliance--git-forensics-scanner",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-compliance--iac-security-scanner",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-compliance--owasp-security-scanner",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-skill:security-compliance--sast-analyzer",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-compliance--secret-detection-scanner",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-compliance--semantic-code-analyzer",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-compliance--vendor-risk-monitor",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--aiml-security",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--binary-exploitation",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--cloud-security-testing",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--cve-cwe-db",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-skill:security-research--fuzzing-ops",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--hardware-security",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--incident-forensics",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-skill:security-research--mitre-attack",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--mobile-security",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--offensive-security",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--pwntools-exploit",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--security-sandbox",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--smart-contract-analysis",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--static-analysis-tools",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 0.7
      }
    },
    {
      "from": "lib-skill:security-research--stix-taxii",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-skill:security-research--yara-rules",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    }
  ]
}

Shortcuts

Back to overview
Open graph tab