pasta-decompose
Installation
SKILL.md
PASTA Stage 3: Application Decomposition
Break the application into its constituent components and analyze trust boundaries, user roles, privilege levels, and data sensitivity at each layer. This produces the component map that Stages 4-7 use to identify where threats and attacks focus.
Supported Flags
Read ../../shared/schemas/flags.md for the full flag specification. Key behaviors:
| Flag | Stage 3 Behavior |
|---|---|
--scope |
Default changed. Scans middleware, auth modules, role definitions, permission configs, database schemas. |
--depth quick |
Component inventory from project structure and imports only. |
--depth standard |
Full decomposition + role-permission matrix + data classification. |
--depth deep |
Standard + cross-component data flows, inter-service auth, shared resource access patterns. |
--depth expert |
Deep + formal trust boundary analysis with privilege escalation path mapping. |
--severity |
Not applicable at this stage. |
Related skills