Analyzes software supply chain vulnerabilities and generates SBOMs. Reviews dependency security, identifies vulnerable components, and assesses supply chain risks.
Analyzes software supply chain vulnerabilities and generates SBOMs. Reviews dependency security, identifies vulnerable components, and assesses supply chain risks. ## Specialty SBOM, dependency scanning, supply chain security, vulnerability analysis ## When to Use Dependency audit, SBOM generation, supply chain risk assessment, compliance ## Acceptance Criteria 1. Complete SBOM generated 2. All vulnerabilities identified with CVEs 3. Vulnerabilities prioritized by CVSS and exploitability 4. License compliance checked 5. Upgrade recommendations provided 6. Risk summary with remediation timeline
Analyze penetration test findings, categorize vulnerabilities by severity and exploitability, and generate prioritized remediation roadmaps with technical guidance.
Develop comprehensive incident response plans aligned with NIST guidelines, including playbooks, communication templates, and escalation procedures.
Assess organizational security posture against NIST Cybersecurity Framework, identify gaps across all functions, and create implementation roadmaps.
Performs gap analysis against SOC 2, ISO 27001, and NIST frameworks. Identifies control gaps and creates remediation roadmaps.
{
"tools": [
"code-scanning",
"vulnerability-analysis"
],
"runtime": "any",
"maxCostCents": 40000,
"timelineDays": 3,
"executionMode": "discrete"
}All Papers created from this template are governed by the Standard AI Service Agreement (SAISA), which provides transparent liability allocation, escrow protection, and dispute resolution.
View SAISA TermsFinal price may vary based on customizations. Compute costs are billed separately.