From appsec
This skill should be used when the user asks to "define business objectives", "identify business-critical assets", "determine risk appetite", or is running PASTA stage 1. Also triggers when the user asks about compliance requirements, acceptable risk thresholds, or business impact analysis in a threat modeling context. Part of the PASTA threat modeling methodology (Stage 1 of 7).
npx claudepluginhub florianbuetow/claude-code --plugin appsecThis skill uses the workspace's default tool permissions.
Establish what the application protects, why it matters, and what business impact
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Establish what the application protects, why it matters, and what business impact a compromise would have. This stage anchors the entire PASTA threat model to real business value so that subsequent stages prioritize by actual organizational impact.
Read ../../shared/schemas/flags.md for the full flag specification. Key behaviors:
| Flag | Stage 1 Behavior |
|---|---|
--scope | Default changed. Scans configs, docs, schemas, and API contracts to infer business purpose. |
--depth quick | Business purpose from project metadata only. |
--depth standard | Full analysis of configs, schemas, and code to infer objectives, compliance, and risk thresholds. |
--depth deep | Standard + trace payment flows, PII handling, and regulatory indicators across the codebase. |
--depth expert | Deep + formal risk tolerance matrix with quantified impact categories. |
--severity | Not applicable at this stage (no vulnerability findings produced). |
Read ../../shared/frameworks/pasta.md, Stage 1 section. PASTA is SEQUENTIAL.
Stage 1 output feeds Stage 2. Do not skip this stage.
None. This is the first stage. The analyst needs access to the application source code, configuration files, and any available documentation.
--scope flag (default: changed).README, package.json, pom.xml, .env.example, database
migrations, API routes, OpenAPI specs, Terraform/CloudFormation, docs/.Scan for indicators: PCI-DSS (payment processing, Stripe), HIPAA (health data, FHIR), GDPR/CCPA (EU data, consent, deletion endpoints), SOX (audit trails), SOC 2 (multi-tenant SaaS, data isolation).
Produce the Stage 1 output document that feeds Stage 2.
Stage 1 produces a Business Context Document. ID prefix: PASTA (e.g., PASTA-S1-001).
## PASTA Stage 1: Business Objectives
### Application Purpose
[1-2 sentence summary of what the application does and why it matters]
### Business-Critical Assets
| Asset | Type | Sensitivity | Impact if Compromised |
|-------|------|-------------|----------------------|
| ... | Data / Process / System | Public / Internal / Confidential / Restricted | ... |
### Compliance Requirements
| Regulation | Applicable | Evidence | Key Requirements |
|-----------|-----------|----------|-----------------|
| PCI-DSS | Yes/No/Unknown | [files/patterns] | [controls] |
| HIPAA / GDPR / SOX | ... | ... | ... |
### Risk Tolerance
| Category | Tolerance | Justification |
|----------|-----------|---------------|
| Downtime | [hours/minutes] | [SLA evidence] |
| Data exposure | [severity] | [data classification] |
| Financial loss | [threshold] | [revenue model] |
### Assumptions
[List assumptions made when business context was ambiguous]
Findings follow ../../shared/schemas/findings.md with:
metadata.tool: "pasta-objectives", metadata.framework: "pasta", metadata.category: "Stage-1"Stage 2: Define Technical Scope (pasta-scope). Pass the Business Context
Document. Stage 2 maps the attack surface and builds DFDs focused on the assets
and processes identified here.