<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Threat-Modeling on Napat&#39;s Inverse Blog</title>
    <link>/tags/threat-modeling/</link>
    <description>Recent content in Threat-Modeling on Napat&#39;s Inverse Blog</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 02 Apr 2026 15:30:00 +0700</lastBuildDate>
    <atom:link href="/tags/threat-modeling/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Five OWASP AI Lists, One Practitioner Problem</title>
      <link>/2026-04-02-five-owasp-ai-lists-one-practitioner-problem/</link>
      <pubDate>Thu, 02 Apr 2026 15:30:00 +0700</pubDate>
      <guid>/2026-04-02-five-owasp-ai-lists-one-practitioner-problem/</guid>
      <description>&lt;p&gt;I was in a meeting recently where someone asked a simple question: &amp;ldquo;Which OWASP list should we use for our AI security review?&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Nobody could answer it. Not because the people in the room were incompetent. The opposite, actually — they&amp;rsquo;d all read the lists, which is precisely why they couldn&amp;rsquo;t answer. There are five of them now. Five OWASP AI security lists. Each one a Top 10, except the one that&amp;rsquo;s a 200-page guide. They overlap, contradict, and occasionally talk past each other. When someone finally pulled up Matt Adams&amp;rsquo; &lt;a href=&#34;https://owaspai.matt-adams.co.uk/&#34;&gt;OWASP AI Top 10 Comparator&lt;/a&gt; — a tool that exists specifically because the proliferation problem is bad enough to need its own website — the room collectively sighed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>DeerFlow vs OpenClaw Security Analysis (AI Experiment)</title>
      <link>/ai-analysis/deer-flow-openclaw-security-analysis-experiment/</link>
      <pubDate>Fri, 27 Mar 2026 12:20:00 +0700</pubDate>
      <guid>/ai-analysis/deer-flow-openclaw-security-analysis-experiment/</guid>
      <description>An opinionated practitioner&amp;#39;s deep dive into DeerFlow and OpenClaw security architectures — what works, what breaks at runtime, where the real risk lives, and how to harden before production.</description>
    </item>
    <item>
      <title>The USB-C Metaphor Hides the Hard Part</title>
      <link>/2026-03-22-the-usb-c-metaphor-hides-the-hard-part/</link>
      <pubDate>Sun, 22 Mar 2026 15:59:00 +0700</pubDate>
      <guid>/2026-03-22-the-usb-c-metaphor-hides-the-hard-part/</guid>
      <description>&lt;h2 id=&#34;threat-modeling-mcp-in-the-real-world&#34;&gt;Threat Modeling MCP in the Real World&lt;/h2&gt;
&lt;p&gt;People like to describe MCP as &amp;ldquo;USB-C for AI.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s a good line. It explains why people care.&lt;/p&gt;
&lt;p&gt;USB-C made hardware interoperability easier. MCP makes tool interoperability easier. Build once, connect everywhere, move faster.&lt;/p&gt;
&lt;p&gt;The problem with good metaphors is that they are usually true in one way and dangerously false in another.&lt;/p&gt;
&lt;p&gt;USB-C looks like a cable problem.
MCP looks like a protocol problem.&lt;/p&gt;
&lt;p&gt;But the hard part isn&amp;rsquo;t the connector. The hard part is delegation.&lt;/p&gt;
&lt;p&gt;When an AI client connects to tools through MCP, it is not just moving data. It is moving authority: who can read what, who can trigger what, and under which identity.&lt;/p&gt;
&lt;p&gt;That shift is what many threat models miss.&lt;/p&gt;
&lt;p&gt;They evaluate MCP like an integration layer, when they should evaluate it like an authorization fabric.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;why-this-matters-now&#34;&gt;Why this matters now&lt;/h2&gt;
&lt;p&gt;Standards compress engineering cost. They also compress attacker learning curves.&lt;/p&gt;
&lt;p&gt;Before MCP, every integration had custom quirks. That was messy for developers and inconvenient for attackers. With standardization, we gain velocity and lose diversity. A weakness in common implementation patterns becomes reusable across many environments.&lt;/p&gt;
&lt;p&gt;This doesn&amp;rsquo;t mean MCP is unsafe. It means MCP is now important enough to threat model as first-class infrastructure.&lt;/p&gt;
&lt;p&gt;The teams that do this early will avoid the coming cycle: rapid adoption, soft defaults, then expensive retrofitting under incident pressure.&lt;/p&gt;
&lt;hr&gt;</description>
    </item>
  </channel>
</rss>
