Free Delivery on orders above $50 for our US and Europe customers

  • Hands-on Security

    Addressing security through physical games

  • Worldwide Shipping

    Breaking through barriers for customers everywhere

  • Fully Custom Games

    For your unique cybersecurity challenges

  • Talk to us!

    We are real people with relevant experience

OWASP® Cornucopia 1.0 Mobile App Edition - Threat Modeling Cards

£21.60

Outcome

Identify security work that needs doing earlier in the project lifecycle. Defuse difficult relationships. Build trust. Bring teams together in peace and harmony.

Made by Agile Stationery

Experts in delivering the right kind of conversations. Slick cards in robust boxes. The best there is outside the casinos.

The Mobile App Edition is the second Cornucopia deck specifically for threat modeling mobile applications and adheres to the same principles and game rules as the original OWASP Cornucopia. This edition is aligned with OWASP Mobile Application Security Verification Standard (MASVS v2.0) and OWASP Mobile Application Security Testing Guide (MASTG) v1.7.

The decks contains 80 tarot cards. Each card describes a common error or anti-pattern that allows systems to be vulnerable to attack. The cards are arranged in five key suits, with a sixth, "Cornucopia," encompassing additional elements:

  • Platform & Code
  • Authentication & Authorization
  • Network & Storage
  • Resilience
  • Cryptography
  • Cornucopia

Key Features:

  • MASVS Mapping: Designed to align with the latest MASVS and MASTG standards.
  • Reliably Fun - consistent with Elevation of Privilege - and Hearts! Simultaneously competitive and collaborative, due to it's playful and inclusive gameplay.
  • Platform and technology-agnostic - useful for everyone from PHP hackers, through Java wranglers, to PhD security experts
  • Convenient tarot size - matching our collection of tarot sized threat modeling games

OWASP is a registered trademark of the OWASP Foundation.

How to play?

  • Set the stage

    Before dealing, sketch a simple diagram of the system on a whiteboard, paper, or digital tool, just enough to show key components and data flows.

  • Deal the cards

    Shuffle the deck and deal all the cards to 3-6 players. Each player organizes their hand by suit (but no peeking at your neighbour’s cards!).

  • Let the game begin

    Decide which player starts. The player who starts reads their card and explains how the threat could affect the system.

  • Winning

    Players take turns with the threats in that suit, with the highest card winning the round. The winner leads the next
    round until all cards are played.

Hybrid teams? No problem

Play our threat modeling games remotely
with the power of physical cards!