threat-modeling

Identify and mitigate security threats during system design.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "threat-modeling" with this command: npx skills add bagelhole/devops-security-agent-skills/bagelhole-devops-security-agent-skills-threat-modeling

Threat Modeling

Identify and mitigate security threats during system design.

STRIDE Methodology

Threat Description Mitigation

Spoofing Pretending to be someone else Authentication

Tampering Modifying data Integrity controls

Repudiation Denying actions Audit logging

Information Disclosure Data exposure Encryption

Denial of Service Making service unavailable Rate limiting

Elevation of Privilege Gaining higher access Authorization

Process

steps: 1_scope: - Define system boundaries - Identify assets - Document data flows

2_diagram: - Create data flow diagrams - Identify trust boundaries - Mark entry points

3_identify: - Apply STRIDE to each component - List potential threats - Document attack vectors

4_assess: - Rate likelihood and impact - Prioritize by risk score

5_mitigate: - Design countermeasures - Accept/transfer risks - Document decisions

Data Flow Diagram

[External User] --> |HTTPS| --> [Load Balancer] | v [Web Server] | [Trust Boundary] | v [App Server] --> [Database]

Threat Cards

threat: id: T001 name: SQL Injection category: Tampering component: Database queries likelihood: High impact: Critical mitigations: - Parameterized queries - Input validation - WAF rules status: Mitigated

Best Practices

  • Integrate into SDLC

  • Review on architecture changes

  • Include development team

  • Document all decisions

  • Regular reassessment

Related Skills

  • sast-scanning - Code analysis

  • penetration-testing - Validation

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

sops-encryption

No summary provided by upstream source.

Repository SourceNeeds Review
Security

linux-administration

No summary provided by upstream source.

Repository SourceNeeds Review
Security

linux-hardening

No summary provided by upstream source.

Repository SourceNeeds Review