Help us improve
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
By sethdford
Comprehensive threat modeling toolkit using STRIDE, attack trees, data flow analysis, and risk scoring. Model threats, analyze attack surfaces, assess organizational risk, and map trust boundaries.
npx claudepluginhub sethdford/claude-skills --plugin security-threat-modelingAnalyze the attack surface to identify exposed components, entry points, and potential attack vectors.
Quantify organizational risk from identified threats using likelihood, impact, and risk scoring methodologies.
Identify and document trust boundaries in the architecture, showing where privilege levels, security contexts, or threat models change.
Conduct comprehensive threat modeling using STRIDE, attack trees, and risk scoring on a system design or architecture.
Design abuse cases (negative use cases) showing how attackers misuse system features. Use when identifying attacks that exploit intended functionality or business logic flaws.
Create a comprehensive inventory of assets (data, systems, infrastructure, people) and their criticality, value, and dependencies. Use when prioritizing threats and allocating security resources.
Build hierarchical attack trees showing how attackers decompose goals into sub-goals and exploits. Use when analyzing attack paths, prioritizing security investments, or assessing attacker effort and cost.
Create and analyze DFDs (Data Flow Diagrams) with security focus, identifying data flows across trust boundaries, storage, and processing points. Use when modeling system architecture for threat analysis.
Quantify risk using likelihood and impact, apply severity ratings, and prioritize mitigations. Use when prioritizing threats, allocating security budget, and communicating risk to leadership.
Share bugs, ideas, or general feedback.
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimBased on adoption, maintenance, documentation, and repository signals. Not a security audit or endorsement.
Repository-grounded threat modeling that enumerates trust boundaries, assets, attacker capabilities, abuse paths, and mitigations, and writes a concise Markdown threat model. Trigger only when the user explicitly asks to threat model a codebase or path, enumerate threats/abuse paths, or perform AppSec threat modeling. Do not trigger for general architecture summaries, code review, or non-security design work. Originally from OpenAI's curated skills catalog.
Cross-cutting security utilities including security champion programs, awareness training, secure architecture review, bug bounty, metrics, red team exercises, and documentation.
Security skills for vibe coding — pre-coding security assessment, code vulnerability review, and threat modeling. Works without any MCP server or Jira/Confluence setup.
Security engineer — IAM, secrets, compliance, threat modeling
🛡️ Security Engineer — Security Engineer + Adversarial Security Specialist
Comprehensive skill pack with 66 specialized skills for full-stack developers: 12 language experts (Python, TypeScript, Go, Rust, C++, Swift, Kotlin, C#, PHP, Java, SQL, JavaScript), 10 backend frameworks, 6 frontend/mobile, plus infrastructure, DevOps, security, and testing. Features progressive disclosure architecture for 50% faster loading.
Establish architecture governance, design fitness functions, manage tech debt, and ensure compliance. Build sustainable architecture practices.
QA skills for accessibility-testing domain.
QA skills for api-testing domain.
Master architecture communication: C4 models, RFCs, presentations, and documentation. Align stakeholders and explain architectural decisions.
Product vision, strategy, positioning, and go-to-market planning.
Comprehensive, standards-grounded Claude Code skills for every role in the Product Development Lifecycle.
454 skills and 173 commands across 57 plugins for 8 roles.
| Role | Skills | Commands | Plugins | Standards Alignment |
|---|---|---|---|---|
| architect | 63 | 10 | 8 | TOGAF, IASA BTABoK, ISO 42010, SWEBOK v4 |
| engineer | 65 | 26 | 8 | SWEBOK v4, SFIA v9, DORA, SPACE, ISO 25010 |
| product-manager | 65 | 26 | 8 | AIPMM PmBoK, ISPMA SPMBoK, PDMA NPDP |
| tech-lead | 63 | 25 | 8 | SFIA v9, DORA/Accelerate, Team Topologies |
| security | 64 | 25 | 8 | NIST CSF 2.0, OWASP SAMM, MITRE ATT&CK, ISO 27001 |
| designer | 63 | 27 | 8 | WCAG 2.2, ISO 9241, Nielsen Heuristics |
| qa-engineer | 63 | 26 | 8 | ISTQB, ISO 25010, WCAG 2.2, IEEE 829 |
| sdlc | 8 | 8 | 1 | ISO/IEC 12207, ISO/IEC 15288 |
Every skill is built on three principles:
claude install github:sethdford/claude-skills/engineer
claude install github:sethdford/claude-skills/engineer/testing
claude install github:sethdford/claude-skills
| Plugin | Skills | Commands | Focus |
|---|---|---|---|
| system-design | 10 | 4 | Decomposition, DDD, microservices, event-driven, CQRS |
| quality-attributes | 8 | 3 | Scalability, reliability, performance, trade-off analysis |
| decision-making | 8 | 3 | ADRs, technology radar, build-vs-buy, migration strategy |
| data-architecture | 8 | 3 | Data modeling, storage selection, event sourcing, pipelines |
| infrastructure-design | 8 | 3 | Cloud architecture, deployment, DR, multi-region |
| architecture-governance | 7 | 3 | Principles, fitness functions, tech debt, compliance |
| communication | 7 | 3 | C4 diagrams, RFCs, stakeholder presentations, roadmaps |
| architect-toolkit | 7 | 3 | Katas, reviews, mentoring, anti-patterns catalog |
| Plugin | Skills | Commands | Focus |
|---|---|---|---|
| code-quality | 10 | 4 | Clean code, refactoring, SOLID, code smells |
| testing | 9 | 4 | TDD, property-based testing, test architecture |
| debugging | 8 | 3 | Systematic debugging, root cause analysis, postmortems |
| implementation-patterns | 8 | 3 | Design patterns, data structures, concurrency |
| api-development | 8 | 3 | REST, GraphQL, gRPC, API design and testing |
| devops-practices | 8 | 3 | CI/CD, containers, deployment, monitoring |
| database-engineering | 7 | 3 | Schema design, query optimization, migrations |
| engineer-toolkit | 7 | 3 | Technical writing, git workflow, incident response |