📄️ Overview
Automated security analysis agent that guides teams through threat modeling, standards mapping, and backlog generation using a structured six-phase workflow
📄️ Why Security Planning?
The reasoning behind structured, phase-based security analysis and how it compares to ad-hoc approaches
📄️ Agent Overview
Architecture, state management, and operational details for the Security Planner agent
📄️ Entry Modes
Detailed guide to the Security Planner's From-PRD and capture entry modes, including prompt usage and workflow differences
📄️ Phase Reference
Detailed reference for each of the Security Planner's six phases, including inputs, outputs, artifacts, and state transitions
📄️ Handoff Pipeline
How the Security Planner generates backlog items and hands off to the RAI Planner for AI/ML risk assessment