About
This skill enables security researchers and developers to systematically map out potential attack vectors using a structured hierarchical model. By defining root goals and breaking them down into AND/OR logic nodes with specific attributes like cost, difficulty, and detection risk, it allows for the identification of the easiest or cheapest paths an attacker might take. It is an essential tool for performing architectural reviews, planning penetration tests, and quantifying the impact of defensive investments by pinpointing unmitigated leaf nodes in complex system designs.