boostsecurityio/supply-chain-research
The attack trees present in this repository were generated using the Deciduous tool.
We welcome community contributions to improve the attack trees as new techniques are discovered and to expand to other CI systems.