Skip to content

sniper-security-audit-

Team Composition

MemberProcessTechnicalCognitiveDomain
threat-modelerthreat-modelersecuritysystems-thinker--
vuln-scannervuln-scannersecuritydevils-advocate--

Tasks

threat-modeler

Threat Modeling

  • ID: threat-modeling
  • Output: threat-model.md

Map the application's attack surface using STRIDE methodology. Identify trust boundaries, data flows, and potential threat vectors. Produce a structured threat model with risk ratings and recommended mitigations.

vuln-scanner

Vulnerability Scanning

  • ID: vulnerability-scanning
  • Output: vulnerability-report.md

Perform application-level vulnerability analysis via code review. Check for OWASP Top 10 issues, insecure dependencies, hardcoded secrets, and missing security controls. Produce a vulnerability report with severity ratings and remediation guidance.

Review Gate

  • Checklist: .sniper/checklists/security-review.md
  • Mode: flexible