threat-mitigation-mapping
Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.
Install this skill
threat-mitigation-mapping1 files
Install this skill with one command
/learn @wshobson/threat-mitigation-mappingInstalls0
RatingNo ratings yet
Rate this skill
Categorydevelopment
UpdatedFebruary 10, 2026
security-scanningwshobson/agents