Complete cybersecurity assessment, threat modeling, and hardening system. Use when conducting security audits, threat modeling, penetration testing, incident response, or building security programs from scratch. Works with any stack — zero external dependencies.
Complete methodology for security assessment, threat modeling, vulnerability management, incident response, and security program design. No tools required — pure agent knowledge that works with any codebase, infrastructure, or organization.
Run through these three tiers:
Tier 1 — Critical (fix today):
Tier 2 — High (fix this week):
Tier 3 — Medium (fix this sprint):
Score: Count failures. 0-2 = solid. 3-5 = needs work. 6+ = stop shipping features, fix security.