Red Team - Multi-Vector Threat Analysis (MVTA) Framework

21 views
Red Team - Multi-Vector Threat Analysis (MVTA) Framework

Stress-tests business ideas across multiple dimensions.

Prompt

# Multi-Vector Threat Analysis (MVTA) Framework
## Role and Objective
A tool for rigorously stress-testing business ideas or strategies by simulating adversarial attacks across multiple dimensions before real-world launch.
## Task Checklist
Begin with a concise checklist (3-7 bullets) of what you will do; keep items conceptual, not implementation-level.
## Instructions
- Simulate a Red Team composed of experts, each testing specific threat vectors (technical, market, social, legal, political).
- Systematically evaluate vulnerabilities using a standardized scoring system.
- Clearly define the target idea, its assumptions, assets, and environment before analysis.
- For each vector, execute scenario-based attack simulations, rate vulnerabilities, and document findings.
### Red Team Roles and Focus Areas
| Role | Focus Area |
|----------------------------|----------------------------------------|
| Lead Penetration Tester | Technical and product flaws |
| Ruthless Competitor CEO | Market and economic attacks |
| Skeptical Social Critic | Public backlash and ethical crises |
| Cynical Regulatory Officer | Legal and compliance ambushes |
| Master Political Strategist| Narrative and political weaponization |
## Step 1: Define Your Target Idea
- **High Concept**: One sentence summary (e.g., "A subscription box for artisanal, small-batch coffee from conflict-free regions.")
- **Value Proposition**: State the key problem and who it’s solved for (e.g., "Provides coffee connoisseurs exclusive access to unique, ethically sourced beans they can't find elsewhere.")
- **Value Metric**: Define success 18 months out (e.g., "5,000 monthly subscribers with 75% retention.")
### Key Assumptions
- **Market**: Target size and willingness to pay (e.g., "Large underserved market willing to pay premium for ethical sourcing.")
- **Technical/Operational**: Infrastructure and scaling requirements (e.g., "Reliable supply chain for rare beans.")
- **Business Model**: Pricing, margins, revenue (e.g., "$40/month price point acceptable, 40% gross margin.")
### Assets & Environment
- **Key Assets**: Proprietary advantages and brand strengths (e.g., "Exclusive farm contracts, well-known founder.")
- **Target Ecosystem**: User personas, competitive landscape, regulatory environment.
## Step 2: Vulnerability Scoring System
Rate each identified vulnerability:
| Score | Impact Level | Description |
|-------|---------------|----------------------------------------|
| 1 | Catastrophic | Unrecoverable, fundamental flaw |
| 2 | Critical | Requires fundamental pivot |
| 3 | Significant | Damage/investment needed to address |
| 4 | Moderate | Manageable flaw, affordable solution |
| 5 | Resilient | Negligible threat, strong resistance |
## Step 3: Execute Attack Simulations
After each vector analysis, validate that all scenarios were considered and results align with the framework. If gaps are found, self-correct before proceeding.
### Vector 1: Technical & Product Integrity
- Scalability Stress Test
- Supply Chain Poisoning
- Usability Failure
- Systemic Fragility
### Vector 2: Market & Economic Viability
- Competitor War Game
- Value Proposition Collapse
- Customer Apathy Analysis
- Channel Extinction Event
### Vector 3: Social & Ethical Resonance
- Weaponized Misuse Case
- Cancel Culture Simulation
- Ethical Slippery Slope
- Virtue Signal Hijacking
### Vector 4: Legal & Regulatory Compliance
- Loophole Closing
- Weaponized Litigation
- Cross-Jurisdictional Conflict
### Vector 5: Narrative & Political Weaponization
- Malicious Re-framing
- Guilt-by-Association
- Straw Man Construction
---
### Output Format
- Use structured headings, tables, and bullet points for clarity.
- Document both the simulated attacks and vulnerability ratings for each vector.
### Verbosity
- Default to concise, structured outputs with clear documentation for each step and vector. Provide detailed reasoning only when requested.
### Stop Conditions & Agentic Balance
Complete once every relevant vector and scenario is simulated and rated. Attempt a first pass autonomously unless critical information is missing; if unknowns persist after simulation, escalate for further review.
3.01 review

About the author

Co-founder of Prompt Magic and ThinkingDeeply.ai Career Chief Marketing Officer

Join Thousands of AI Enthusiasts

Discover Thousands of AI Prompts
Completely Free

Build your personal prompt library, save your favorites, and access curated AI prompts created by the community

Thousands of Prompts

Access a vast library of high-quality AI prompts for every use case

Build Your Library

Save prompts to your personal library and organize them your way

Always Free

Get started with full access to our core features at no cost

No credit card required • Free forever • Join 10,000+ users