Example output
# Security Research Methodology: MEAN Stack Web Application
## 1. Research Architecture
### Attack Surface Mapping
- External interfaces: REST APIs, user interfaces, authentication endpoints
- Data flow paths: Client-server communications, database interactions
- Asset inventory: MongoDB collections, Express routes, Angular components
- Integration points: Third-party services, APIs, CDNs
### Threat Modeling Framework
- STRIDE analysis for each component
- Trust boundaries between MEAN stack layers
- Data classification matrix
- Access control mapping
### Vulnerability Assessment Matrix
| Component | Test Cases | Tools | Priority |
|-------------|------------|-------|----------|
| MongoDB | NoSQL injection, access controls | MongoDB security scanner | P1 |
| Express | Route security, middleware analysis | Static analysis, DAST | P1 |
| Angular | Client-side validation, XSS vectors | Browser security tools | P2 |
| Node.js | Dependency analysis, server config | SAST, composition analysis | P1 |
### Risk Prioritization System
- Critical: Authentication bypass, RCE, data exposure
- High: Authorization flaws, injection vulnerabilities
- Medium: Security misconfigurations, weak crypto
- Low: Information disclosure, best practice violations
## 2. Analysis Protocol
### Pattern Recognition Framework
- Architecture patterns analysis
- MVC implementation review
- State management assessment
- Data flow validation
- Security anti-patterns identification
- Input validation gaps
- Authentication weaknesses
- Authorization flaws
### Impact Assessment Methodology
1. Technical Impact
- Data confidentiality
- System integrity
- Service availability
2. Business Impact
- Regulatory compliance
- Reputation risk
- Financial exposure
### Root Cause Analysis Structure
1. Vulnerability discovery
2. Technical deep-dive
3. Contributing factors
4. Systemic issues
5. Architecture implications
### Evidence Documentation System
- Screenshots: UI vulnerabilities, configuration issues
- Network captures: API security issues, data leaks
- Code snippets: Implementation flaws
- Logs: Security events, exploitation attempts
## 3. Documentation Matrix
### Finding Classification System
- ID: [YEAR]-[COMPONENT]-[VULNTYPE]-[NUMBER]
- Severity: CVSS v3.1 scoring
- Category: CWE mapping
- Status tracking
### Technical Writing Framework
1. Executive Summary
- Key findings
- Risk assessment
- Remediation roadmap
2. Technical Details
- Vulnerability analysis
- Proof of concept
- Impact assessment
3. Recommendations
- Short-term fixes
- Long-term architecture improvements
- Security controls enhancement
### Recommendation Template
```
Finding: [ID]
Description: Clear, technical explanation
Impact: Business and technical implications
Remediation:
- Immediate actions
- Architecture changes
- Control improvements
Validation: Testing procedures for fixes
```
## Timeline Breakdown
Week 1: Architecture analysis, setup
Week 2: Component security assessment
Week 3: Deep-dive testing, exploitation
Week 4: Documentation, reporting
The framework includes comprehensive coverage of the MEAN stack with grey-box testing approach. Key features:
1. Component-specific security testing
2. Systematic documentation structure
3. Timeline-aligned deliverables
4. Risk-based prioritization
Need any specific section expanded or modified?