Analyze the attack surface to identify exposed components, entry points, and potential attack vectors.
From threat-modelingnpx claudepluginhub sethdford/claude-skills --plugin security-threat-modelingsystem name or API endpoint listChain these steps:
data-flow-diagram-security skill to identify all entry points: external APIs, user inputs, integrations with third parties, admin interfacestrust-boundary-analysis skill to map which components are exposed to untrusted users vs. internal-onlythreat-identification skill to catalog known attack vectors for exposed technologies (e.g., OWASP Top 10 for web apps, MITRE ATT&CK for cloud)attack-tree-modeling skill to decompose how attackers could reach critical assets from external entry pointsabuse-case-design skill to identify business logic flaws that could be exploited at each entry pointDeliverables:
After completion, suggest follow-up commands: model-threats, assess-risk, review-api-security.