II.
Workflow JSON
Structured · liveworkflow:vulnerability-management
workflow:vulnerability-management json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "workflow:vulnerability-management",
"_kind": "Workflow",
"_file": "domain/products/krate-connectivity.yaml",
"_cluster": "domain",
"attributes": {},
"outgoingEdges": [
{
"from": "workflow:vulnerability-management",
"to": "platform:krate",
"kind": "integrates_with",
"attributes": {
"notes": "Vulnerability remediation dispatches agents to patch repos on Krate"
}
},
{
"from": "workflow:vulnerability-management",
"to": "role:security-engineer",
"kind": "involves_role"
},
{
"from": "workflow:vulnerability-management",
"to": "role:devops-engineer",
"kind": "involves_role"
},
{
"from": "workflow:vulnerability-management",
"to": "role:platform-engineer",
"kind": "involves_role"
},
{
"from": "workflow:vulnerability-management",
"to": "role:backend-engineer",
"kind": "involves_role"
},
{
"from": "workflow:vulnerability-management",
"to": "role:compliance-officer",
"kind": "involves_role"
},
{
"from": "workflow:vulnerability-management",
"to": "domain:cybersecurity",
"kind": "applies_to_domain"
},
{
"from": "workflow:vulnerability-management",
"to": "domain:devops",
"kind": "applies_to_domain"
},
{
"from": "workflow:vulnerability-management",
"to": "domain:cloud-infra",
"kind": "applies_to_domain"
},
{
"from": "workflow:vulnerability-management",
"to": "responsibility:security-audit",
"kind": "triggers_responsibility"
},
{
"from": "workflow:vulnerability-management",
"to": "responsibility:risk-assessment",
"kind": "triggers_responsibility"
},
{
"from": "workflow:vulnerability-management",
"to": "responsibility:compliance-monitoring",
"kind": "triggers_responsibility"
},
{
"from": "workflow:vulnerability-management",
"to": "role:vulnerability-scanner",
"kind": "involves_role",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "role:security-reviewer",
"kind": "involves_role",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "role:dependency-updater",
"kind": "involves_role",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "skill-area:secrets-rotation",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "domain:cybersecurity",
"kind": "applies_to_domain",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "domain:security",
"kind": "applies_to_domain",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "responsibility:run-security-scans",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "responsibility:upgrade-dependencies-weekly",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "org-unit:security-team",
"kind": "performed_by_org_unit",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "org-unit:engineering",
"kind": "performed_by_org_unit",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "org-unit:application-security-team",
"kind": "performed_by_org_unit",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "role:vulnerability-scanner",
"kind": "involves_role",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "role:security-reviewer",
"kind": "involves_role",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "role:dependency-updater",
"kind": "involves_role",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "skill-area:secrets-rotation",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "domain:cybersecurity",
"kind": "applies_to_domain",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "domain:security",
"kind": "applies_to_domain",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "responsibility:run-security-scans",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "responsibility:upgrade-dependencies-weekly",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "org-unit:security-team",
"kind": "performed_by_org_unit",
"attributes": {}
},
{
"from": "workflow:vulnerability-management",
"to": "org-unit:engineering",
"kind": "performed_by_org_unit",
"attributes": {}
}
],
"incomingEdges": [
{
"from": "stack-profile:vulnerability-management-platform",
"to": "workflow:vulnerability-management",
"kind": "follows_workflow"
},
{
"from": "tool-server:mcp-snyk",
"to": "workflow:vulnerability-management",
"kind": "supports_work",
"attributes": {
"confidence": "high",
"evidence": "Findings, severity, and remediation metadata project vulnerability workflows."
}
},
{
"from": "tool-server:mcp-sonarqube",
"to": "workflow:vulnerability-management",
"kind": "supports_work",
"attributes": {
"confidence": "medium",
"evidence": "Security hotspots and code smells feed remediation workflows."
}
},
{
"from": "tool-server:mcp-wiz-candidate",
"to": "workflow:vulnerability-management",
"kind": "supports_work",
"attributes": {
"confidence": "medium",
"evidence": "CNAPP findings are relevant inputs to vulnerability-management workflows."
}
},
{
"from": "lib-agent:security-compliance--forensic-analysis-agent",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-compliance--incident-triage-agent",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-compliance--patch-management-agent",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-compliance--remediation-guidance-agent",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-compliance--risk-scoring-agent",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-compliance--threat-intelligence-agent",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-compliance--vulnerability-triage-agent",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--cloud-security-researcher",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-agent:security-research--exploit-developer",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-agent:security-research--fuzzing-engineer",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-agent:security-research--hardware-security-researcher",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-agent:security-research--malware-analyst",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--mobile-researcher",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-agent:security-research--purple-team-coordinator",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-agent:security-research--red-team-operator",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-agent:security-research--reverse-engineer",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-agent:security-research--security-report-writer",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--smart-contract-auditor",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-agent:security-research--threat-intel-analyst",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--vuln-researcher",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--web-security-researcher",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-process:cryptography-blockchain--smart-contract-security-audit",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:automotive-engineering--cybersecurity-engineering",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:gpu-programming--reduction-scan-implementation",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:research--novelties-scanner",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--business-continuity",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--codebase-security-audit",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--container-security",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--dast-process",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--data-classification",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--disaster-recovery-testing",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-process:security-compliance--encryption-standards",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--gdpr-compliance",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--hipaa-compliance",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--iac-security-review",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--iam-access-control",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--iso27001-implementation",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--nation-state-trojan-detection",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--pci-dss-compliance",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--penetration-testing",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-process:security-compliance--sast-pipeline",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-process:security-compliance--sca-dependency-management",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--secrets-management",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--security-logging-monitoring",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--security-policies",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--security-training",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--soc2-compliance",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--stride-threat-modeling",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--third-party-risk",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--vulnerability-management",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--ai-ml-security-research",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--api-security-research",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--binary-reverse-engineering",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--bug-bounty-workflow",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--capture-the-flag-challenges",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--cloud-security-research",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--container-security-research",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--dynamic-analysis-runtime-testing",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--exploit-development",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--firmware-analysis",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--fuzzing-campaign",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--hardware-security-research",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--malware-analysis",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--mobile-app-security-research",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--network-penetration-testing",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--protocol-reverse-engineering",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--purple-team-exercise",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--red-team-operations",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--responsible-disclosure",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--security-advisory-writing",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--security-research-lab-setup",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--security-research-publication",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--security-tool-development",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--shellcode-development",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--smart-contract-auditing",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--static-code-analysis",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--supply-chain-security",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--threat-intelligence-research",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--variant-analysis",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--vulnerability-research-workflow",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--vulnerability-root-cause-analysis",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--web-app-vuln-research",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-compliance--aws-security-scanner",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-compliance--azure-security-scanner",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-compliance--container-security-scanner",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-compliance--dast-scanner",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-compliance--dependency-scanner",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-compliance--gcp-security-scanner",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-compliance--git-forensics-scanner",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-compliance--iac-security-scanner",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-compliance--owasp-security-scanner",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-compliance--sast-analyzer",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-compliance--secret-detection-scanner",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-compliance--semantic-code-analyzer",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-compliance--vendor-risk-monitor",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--aiml-security",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--binary-exploitation",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--cloud-security-testing",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--cve-cwe-db",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--fuzzing-ops",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--hardware-security",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--incident-forensics",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--mitre-attack",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--mobile-security",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--offensive-security",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--pwntools-exploit",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--security-sandbox",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--smart-contract-analysis",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--static-analysis-tools",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 0.7
}
},
{
"from": "lib-skill:security-research--stix-taxii",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--yara-rules",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
}
]
}