diff --git a/api/wired-pending/intent-opus4-dev_security.php b/api/wired-pending/intent-opus4-dev_security.php index d30e26253..9d3be0170 100644 --- a/api/wired-pending/intent-opus4-dev_security.php +++ b/api/wired-pending/intent-opus4-dev_security.php @@ -30,11 +30,6 @@ return array ( 22 => 'comment faire un pentest', 23 => 'quelle meilleure facon proteger infrastructure', 24 => 'how to deploy a SIEM', - 25 => 'scope projet centralisation logs securite entreprise', - 26 => 'scope projet surveillance securite entreprise', - 27 => 'scope projet test intrusion entreprise', - 28 => 'scope projet durcissement infrastructure weval', - 29 => 'project scope centralized security logs enterprise', 20 => 'red team exercise' ), 'cmd' => 'echo "=== WEVIA propose un scope SECURITY ==="; echo ""; echo "Stack options WEVAL-ready:"; echo "1. CrowdSec + fail2ban (deja deploye S204, IP threat intelligence)\n2. OWASP ZAP + Burp Suite (pentesting web apps)\n3. Wazuh SIEM (open-source SOC, log aggregation)\n4. HashiCorp Vault (secrets management centralise)\n5. GPG/age + chattr +i (WEVAL pattern secrets.env protection)"; echo ""; echo "Agents WEVIA mobilisables:"; echo "- CrowdSec deja deploye S204 (whitelist auto pattern V9.63)\n- WEVIA Master pour audit posture\n- Paperclip pour pilotage remediation findings"; echo ""; echo "Pour avancer:"; echo "1. Scope (app web, infra, SOC 24/7, compliance cible)\n2. Audit initial (OWASP Top 10, CIS benchmarks, nmap)\n3. POC 1 scope 2sem / MVP complet 2mois / Enterprise 3-6mois\n4. Certification audit externe si compliance ISO 27001 / SOC 2"; echo ""; echo "Quel est ton risque principal? App publique, data sensitive, ou compliance?"',