Stage 1 -- Business Objectives: Receives only the file list. Infers
business context from code artifacts (payment processing, PII handling,
authentication flows, admin interfaces). Outputs business context
statement, risk tolerance, and compliance requirements.
Stage 2 -- Technical Scope: Receives Stage 1 output plus file list.
Maps entry points, protocols, external dependencies, and tech stack.
May request expanded file scanning to find architecture artifacts
(Dockerfiles, K8s manifests, API gateway configs).
Stage 3 -- Application Decomposition: Receives Stages 1-2 output.
Decomposes into components, maps trust boundaries, classifies data
sensitivity, documents auth/authz flows per component.
Stage 4 -- Threat Analysis: Receives Stages 1-3 output. Identifies
threats using real-world intelligence, maps to MITRE ATT&CK techniques,
builds attack trees for high-value targets identified in Stage 1.
Stage 5 -- Vulnerability Analysis: Receives Stages 1-4 output. Core
code analysis stage. Finds specific weaknesses that enable the threats
from Stage 4. Maps to CWE identifiers. Prioritizes vulnerabilities that
directly enable identified threats over theoretical weaknesses.
Stage 6 -- Attack Simulation: Receives Stages 1-5 output. Constructs
multi-step exploit chains combining threats (Stage 4) with vulnerabilities
(Stage 5). Scores each chain with DREAD. Identifies which attacks reach
business-critical assets from Stage 1.
Stage 7 -- Risk & Impact Analysis: Receives Stages 1-6 output.
Calculates business-weighted risk scores (Likelihood x Business Impact).
Produces risk-ranked finding list, mitigation roadmap (quick wins / short
term / long term), compliance gap report, and executive summary.
第1阶段——业务目标:仅接收文件列表。从代码工件(支付处理、PII处理、认证流程、管理界面)中推断业务上下文。输出业务上下文说明、风险容忍度和合规要求。
第2阶段——技术范围:接收第1阶段输出和文件列表。映射入口点、协议、外部依赖和技术栈。可能会请求扩大文件扫描范围以查找架构工件(Dockerfiles、K8s清单、API网关配置)。
第3阶段——应用分解:接收第1-2阶段输出。将应用分解为组件,映射信任边界,分类数据敏感度,记录每个组件的认证/授权流程。
第4阶段——威胁分析:接收第1-3阶段输出。使用真实世界情报识别威胁,映射至MITRE ATT&CK技术,为第1阶段中识别的高价值目标构建攻击树。
第5阶段——漏洞分析:接收第1-4阶段输出。核心代码分析阶段。查找可利用第4阶段中威胁的特定弱点,映射至CWE标识符。优先处理可直接利用已识别威胁的漏洞,而非理论上的弱点。
第6阶段——攻击模拟:接收第1-5阶段输出。结合第4阶段的威胁和第5阶段的漏洞构建多步骤利用链。使用DREAD为每个链评分。识别哪些攻击可触及第1阶段中的业务关键资产。
第7阶段——风险与影响分析:接收第1-6阶段输出。计算业务加权风险评分(可能性×业务影响)。生成按风险排名的发现结果列表、缓解路线图(快速获胜/短期/长期)、合规缺口报告和执行摘要。