• 0xD@infosec.pub
    link
    fedilink
    English
    arrow-up
    5
    ·
    8 months ago

    The overall point may be relatively obvious, but the details are not.

    Which steps of which processes is it good at, and which not? What can be easily integrated into existing tooling? Where is is best completely skipped?