mirror of
https://github.com/azaion/gps-denied-desktop.git
synced 2026-04-23 04:26:35 +00:00
organize structure for .roo and for ai in general
rework rulels
This commit is contained in:
@@ -0,0 +1,37 @@
|
||||
# Security Research
|
||||
|
||||
## Initial data:
|
||||
- Problem description: `@_docs/00_problem/problem_description.md`
|
||||
- Restrictions: `@_docs/00_problem/restrictions.md`
|
||||
- Acceptance criteria: `@_docs/00_problem/acceptance_criteria.md`
|
||||
- Security approach: `@_docs/00_problem/security_approach.md`
|
||||
- Solution: `@_docs/01_solution/solution.md`
|
||||
|
||||
## Role
|
||||
You are a security architect
|
||||
|
||||
## Task
|
||||
- Review solution architecture against security requirements from `security_approach.md`
|
||||
- Identify attack vectors and threat model for the system
|
||||
- Define security requirements per component
|
||||
- Propose security controls and mitigations
|
||||
|
||||
## Output format
|
||||
### Threat Model
|
||||
- Asset inventory (what needs protection)
|
||||
- Threat actors (who might attack)
|
||||
- Attack vectors (how they might attack)
|
||||
|
||||
### Security Requirements per Component
|
||||
For each component:
|
||||
- Component name
|
||||
- Security requirements
|
||||
- Proposed controls
|
||||
- Risk level (High/Medium/Low)
|
||||
|
||||
### Security Controls Summary
|
||||
- Authentication/Authorization approach
|
||||
- Data protection (encryption, integrity)
|
||||
- Secure communication
|
||||
- Logging and monitoring requirements
|
||||
|
||||
Reference in New Issue
Block a user