2020-03-05 20:19:57 +00:00
|
|
|
{
|
|
|
|
"summary": {
|
|
|
|
"title": "goutils threat model",
|
|
|
|
"owner": "K",
|
|
|
|
"description": "HTF COMPUTER DO WHAT COMPUTER DO"
|
|
|
|
},
|
|
|
|
"detail": {
|
|
|
|
"contributors": [],
|
2020-03-05 20:20:49 +00:00
|
|
|
"diagrams": [
|
|
|
|
{
|
|
|
|
"title": "COMPUTRONICS",
|
|
|
|
"thumbnail": "./public/content/images/thumbnail.jpg",
|
|
|
|
"id": 0
|
|
|
|
}
|
|
|
|
],
|
2020-03-05 20:19:57 +00:00
|
|
|
"reviewer": "K"
|
|
|
|
}
|
|
|
|
}
|