🔧
Decomposing tasks and assigning roles.
Detailed Information
Hierarchical planning can be exploited for privilege escalation or role confusion. Reference: OWASP KC2, AISVS C9.
Parent Component
🎛️Orchestration (Control Flow)Security Implications
Hierarchical planning can be exploited for privilege escalation or role confusion. Reference: OWASP KC2, AISVS C9.
Implementation Considerations
Apply appropriate security controls and monitoring based on the parent component's implementation guidance. Reference: OWASP KC2, AISVS C9
🗂️ Framework References