* Focus on threatspec-go. Get the tool working nicely, simplify installation etc, write some decent reporting tools and even a DFD generator.
So, do we focus on Go, Python or CloudFormation templates?
--
https://threatspec.org
---
You received this message because you are subscribed to the Google Groups "threatspec" group.
To unsubscribe from this group and stop receiving emails from it, send an email to threatspec+unsubscribe@googlegroups.com.
To post to this group, send email to threa...@googlegroups.com.
Visit this group at https://groups.google.com/group/threatspec.
To view this discussion on the web, visit https://groups.google.com/d/msgid/threatspec/e6657c28-07e4-4f0b-a186-449ca18aae12%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
This is based purely on a guess of the type of users who want to invest the time in integrating ThreatSpec into their projects. If you cast a net of all Cloudformation users, chances are you're going to catch many more threat modellers than if you cast a Go-net. I haven't worked with cloudformation, but since it's all about the automation there might be scope to do more coolStuff(tm) in the future - maybe even auto-apply the threatspec mitigation to the template? or trigger cloudwatch alerts automatically based on threatspec content.
On Sunday, 26 February 2017 08:03:46 UTC, Stephen de Vries wrote:I posted to the Upspin mailing list last night. There is a Github issue about having a better defined security model, so I asked whether there was an appetite for code-driven threat modelling. I suspect there won't be much of a response (i think threat modelling is a hard sell in general), so if that goes nowhere perhaps CFT is the way to go....
I like it. The more expressive, the better. Adding that to the Python
parser would be a breeze, too. I've no idea how CFTs look or work,
though. Maybe you could wire this stuff in and circulate it to the
list?