{
  "name": "Infosec Wales",
  "short_name": "Infosec Wales",
  "description": "Defensive Cybersecurity Education Platform - Comprehensive resources for security professionals including IR guides, DFIR tools, SOC maturity frameworks, and hands-on simulators.",
  "start_url": "/",
  "display": "standalone",
  "background_color": "#1a365d",
  "theme_color": "#1a365d",
  "orientation": "portrait-primary",
  "scope": "/",
  "lang": "en-GB",
  "categories": ["education", "security", "technology", "professional"],
  "icons": [
    {
      "src": "/assets/images/favicon-16x16.png",
      "sizes": "16x16",
      "type": "image/png",
      "purpose": "any maskable"
    },
    {
      "src": "/assets/images/favicon-32x32.png",
      "sizes": "32x32",
      "type": "image/png",
      "purpose": "any maskable"
    },
    {
      "src": "/assets/images/apple-touch-icon.png",
      "sizes": "180x180",
      "type": "image/png",
      "purpose": "any maskable"
    },
    {
      "src": "/assets/images/android-chrome-192x192.png",
      "sizes": "192x192",
      "type": "image/png",
      "purpose": "any maskable"
    },
    {
      "src": "/assets/images/android-chrome-512x512.png",
      "sizes": "512x512",
      "type": "image/png",
      "purpose": "any maskable"
    }
  ],
  "shortcuts": [
    {
      "name": "Practice Guides",
      "short_name": "Guides",
      "description": "Access incident response, DFIR, and SOC maturity guides",
      "url": "/guides/",
      "icons": [
        {
          "src": "/assets/images/icons/guides-icon.svg",
          "sizes": "64x64"
        }
      ]
    },
    {
      "name": "IR Simulator",
      "short_name": "Simulator",
      "description": "Practice incident response scenarios",
      "url": "/simulator/",
      "icons": [
        {
          "src": "/assets/images/icons/simulator-icon.svg",
          "sizes": "64x64"
        }
      ]
    },
    {
      "name": "Interactive Explainers",
      "short_name": "Explainers",
      "description": "Visual cybersecurity concepts and frameworks",
      "url": "/explainers/",
      "icons": [
        {
          "src": "/assets/images/icons/explainers-icon.svg",
          "sizes": "64x64"
        }
      ]
    },
    {
      "name": "Myth Busting",
      "short_name": "Myths",
      "description": "Evidence-based analysis of cybersecurity myths",
      "url": "/mythbusting/",
      "icons": [
        {
          "src": "/assets/images/icons/myths-icon.svg",
          "sizes": "64x64"
        }
      ]
    }
  ],
  "screenshots": [
    {
      "src": "/assets/images/screenshots/homepage-desktop.png",
      "sizes": "1280x720",
      "type": "image/png",
      "form_factor": "wide",
      "label": "Infosec Wales Homepage - Desktop View"
    },
    {
      "src": "/assets/images/screenshots/homepage-mobile.png",
      "sizes": "390x844",
      "type": "image/png",
      "form_factor": "narrow",
      "label": "Infosec Wales Homepage - Mobile View"
    }
  ],
  "related_applications": [
    {
      "platform": "webapp",
      "url": "https://www.infosec.wales"
    }
  ],
  "prefer_related_applications": false,
  "edge_side_panel": {
    "preferred_width": 400
  },
  "launch_handler": {
    "client_mode": "navigate-existing"
  },
  "handle_links": "preferred",
  "protocol_handlers": [
    {
      "protocol": "web+infosec",
      "url": "/?protocol=%s"
    }
  ]
}
