Threat Modeling and Attack Surface Mapping -> Logic Flaws Identification -> Add a topic for skimming a projects GH issues to see if we can find
a) defects that lead to security vulns
b) find security concerns that are not yet resolved so we can formulate a POC
b1) If the vuln is found in a 3rd party component how does this reflect in the primary target
Threat Modeling and Attack Surface Mapping -> Logic Flaws Identification -> Add a topic for skimming a projects GH issues to see if we can find
a) defects that lead to security vulns b) find security concerns that are not yet resolved so we can formulate a POC b1) If the vuln is found in a 3rd party component how does this reflect in the primary target