-
### Is there an existing Discovery issue on this topic?
- [X] I have searched the existing issues
### Objective
Use chatGPT3.5 or chatGPT4 to ask the following question.
If using chatGPT3.5:
``…
-
## What is missing or needs to be updated?
The [OWASP project pytm](https://owasp.org/www-project-pytm/) provides a threat modeling tool which can generate Data Flow Diagrams, Sequence Diagrams and t…
-
We currently have six (6) TemplateVMs and seven (7) AppVMs as part of the core Workstation components:
```
[user@dom0 ~]$ qvm-ls --tags sd-workstation | grep TemplateVM | wc -l
6
[user@dom0 ~]$ …
-
(Copied and pasted from reddit thread)
I love picking out domains safing shows accessed my computer, researching where they go, and then blocking the shit out of the ones I don't want.
What …
-
This issue is for tracking the development of a more generic and robust solution to detect the classic drop an implant and execute it TTP called "drop+exec". In addition, perform threat modeling not…
-
## What is missing or needs to be updated?
[Mozilla SeaSponge](https://github.com/mozilla/seasponge) does not seem to be active - the last significant commit was January 2016 and the repo has been ar…
-
According to the CNCF TOC’s [suggestion](https://github.com/cncf/toc/issues/981#issuecomment-1411128982), Notary is requested to undergo a security audit targeting the Notary v2/Notation work, includi…
-
As a secureCodeBox user i want to know more about the security aspects of the secureCodeBox itself. Therfore i would like to find a documented threat modell of the project which lists all known threat…
-
Reviewer Comments:
Evasion: There currently seem to be very straight forward ways in which to evade the system, e.g. the flow eviction mechanism prioritized the first malicious flow. All subsequent m…
-
**What would you like added?**
Could the existing section on Threat Modeling (section 2.5) be modified with links to [Pythonic Threat Modeling ](https://owasp.org/www-project-pytm/) and [Threat Drago…