Build comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.
AUTHORIZED USE ONLY: Use this skill only for authorized security assessments, defensive validation, or controlled educational environments.
Systematic attack path visualization and analysis.
resources/implementation-playbook.md.resources/implementation-playbook.md for detailed patterns, templates, and examples.