Skip to content

Develop competency questions for Jans to test NLP based on descriptions of Weaknesses and AttackPatterns #125

@rhohimer

Description

@rhohimer

Image

"I am using/have <software | protocol | etc>, what attack patterns am I susceptible to?"
E.g., I am using the SSL protocol, what attack patterns am I susceptible to?
"What are the most recent vulnerabilities that target the software and how can I detect it?"
E.g., What are the most recent vulnerabilities that target the software log4j and how can I detect it?
"What is the weakness associated with the vulnerability and how are attack patterns trying to exploit it?"
E.g., What is the weakness associated with the log4j vulnerability and how are attack patterns trying to exploit it?
"What attack patterns am I susceptible to if ?
E.g., What attack patterns am I susceptible to if the internal state of my product is revealed through the response to a query?

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions