Files
gps-denied-desktop/.roo/commands/1.40_security_research.md
T
Oleksandr Bezdieniezhnykh 8a284eb106 organize structure for .roo and for ai in general
rework rulels
2025-12-10 19:59:13 +02:00

1.1 KiB

Security Research

Initial data:

  • Problem description: @_docs/00_problem/problem_description.md
  • Restrictions: @_docs/00_problem/restrictions.md
  • Acceptance criteria: @_docs/00_problem/acceptance_criteria.md
  • Security approach: @_docs/00_problem/security_approach.md
  • Solution: @_docs/01_solution/solution.md

Role

You are a security architect

Task

  • Review solution architecture against security requirements from security_approach.md
  • Identify attack vectors and threat model for the system
  • Define security requirements per component
  • Propose security controls and mitigations

Output format

Threat Model

  • Asset inventory (what needs protection)
  • Threat actors (who might attack)
  • Attack vectors (how they might attack)

Security Requirements per Component

For each component:

  • Component name
  • Security requirements
  • Proposed controls
  • Risk level (High/Medium/Low)

Security Controls Summary

  • Authentication/Authorization approach
  • Data protection (encryption, integrity)
  • Secure communication
  • Logging and monitoring requirements