From threatmodel-skills
Creates programmatic threat models in Python using pytm for STRIDE analysis, DFD generation, automated threat identification, and reports integrable into CI/CD pipelines.
npx claudepluginhub agentsecops/secopsagentkit --plugin offsec-skillsThis skill uses the workspace's default tool permissions.
pytm is a Python library for programmatic threat modeling based on the STRIDE methodology. It enables
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Designs, implements, and audits WCAG 2.2 AA accessible UIs for Web (ARIA/HTML5), iOS (SwiftUI traits), and Android (Compose semantics). Audits code for compliance gaps.
pytm is a Python library for programmatic threat modeling based on the STRIDE methodology. It enables security engineers to define system architecture as code, automatically generate data flow diagrams (DFDs), identify security threats across trust boundaries, and produce comprehensive threat reports. This approach integrates threat modeling into CI/CD pipelines, enabling shift-left security and continuous threat analysis.
Create a basic threat model:
#!/usr/bin/env python3
from pytm import TM, Server, Dataflow, Boundary, Actor
# Initialize threat model
tm = TM("Web Application Threat Model")
tm.description = "E-commerce web application"
# Define trust boundaries
internet = Boundary("Internet")
dmz = Boundary("DMZ")
internal = Boundary("Internal Network")
# Define actors and components
user = Actor("Customer")
user.inBoundary = internet
web = Server("Web Server")
web.inBoundary = dmz
db = Server("Database")
db.inBoundary = internal
# Define data flows
user_to_web = Dataflow(user, web, "HTTPS Request")
user_to_web.protocol = "HTTPS"
user_to_web.data = "credentials, payment info"
user_to_web.isEncrypted = True
web_to_db = Dataflow(web, db, "Database Query")
web_to_db.protocol = "SQL/TLS"
web_to_db.data = "user data, transactions"
# Generate threat report and diagram
tm.process()
Install pytm:
pip install pytm
# Also requires graphviz for diagram generation
brew install graphviz # macOS
# or: apt-get install graphviz # Linux
Progress:
[ ] 1. Define system scope and trust boundaries
[ ] 2. Identify all actors (users, administrators, external systems)
[ ] 3. Map system components (servers, databases, APIs, services)
[ ] 4. Define data flows between components with security attributes
[ ] 5. Run tm.process() to generate threats and DFD
[ ] 6. Review STRIDE threats and add mitigations
[ ] 7. Generate threat report with scripts/generate_report.py
Work through each step systematically. Check off completed items.
pytm automatically identifies threats based on STRIDE categories:
For each identified threat:
references/risk_matrix.md)threat.mitigation = "description"Define system architecture programmatically:
from pytm import TM, Server, Datastore, Dataflow, Boundary, Actor, Lambda
tm = TM("Microservices Architecture")
# Cloud boundaries
internet = Boundary("Internet")
cloud_vpc = Boundary("Cloud VPC")
# API Gateway
api_gateway = Server("API Gateway")
api_gateway.inBoundary = cloud_vpc
api_gateway.implementsAuthentication = True
api_gateway.implementsAuthorization = True
# Microservices
auth_service = Lambda("Auth Service")
auth_service.inBoundary = cloud_vpc
order_service = Lambda("Order Service")
order_service.inBoundary = cloud_vpc
# Data stores
user_db = Datastore("User Database")
user_db.inBoundary = cloud_vpc
user_db.isEncryptedAtRest = True
# Data flows with security properties
client_to_api = Dataflow(Actor("Client"), api_gateway, "API Request")
client_to_api.protocol = "HTTPS"
client_to_api.isEncrypted = True
client_to_api.data = "user credentials, orders"
api_to_auth = Dataflow(api_gateway, auth_service, "Auth Check")
api_to_auth.protocol = "gRPC/TLS"
auth_to_db = Dataflow(auth_service, user_db, "User Lookup")
auth_to_db.protocol = "TLS"
tm.process()
Automate threat modeling in continuous integration:
# .github/workflows/threat-model.yml
name: Threat Model Analysis
on: [push, pull_request]
jobs:
threat-model:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Set up Python
uses: actions/setup-python@v4
with:
python-version: '3.10'
- name: Install dependencies
run: |
pip install pytm
sudo apt-get install -y graphviz
- name: Generate threat model
run: python threat_model.py
- name: Upload DFD diagram
uses: actions/upload-artifact@v3
with:
name: threat-model-dfd
path: '*.png'
- name: Check for unmitigated threats
run: python scripts/check_mitigations.py threat_model.py
Generate comprehensive threat documentation:
# Run threat model with report generation
python threat_model.py
# Generate markdown report
./scripts/generate_report.py --model threat_model.py --output threat_report.md
# Generate JSON for tool integration
./scripts/generate_report.py --model threat_model.py --format json --output threats.json
Report includes:
Log the following for security governance:
scripts/)generate_report.py - Generate markdown/JSON threat reports with STRIDE categorizationcheck_mitigations.py - Validate all identified threats have documented mitigationsthreat_classifier.py - Classify threats by severity using DREAD or custom risk matrixtemplate_generator.py - Generate threat model templates for common architecturesreferences/)stride_methodology.md - Complete STRIDE methodology guide with threat examplesrisk_matrix.md - Risk assessment framework with likelihood and impact scoringcomponent_library.md - Reusable pytm components for common patterns (APIs, databases, cloud services)mitigation_strategies.md - Common mitigation patterns mapped to STRIDE categories and OWASP controlsassets/)templates/web_application.py - Web application threat model templatetemplates/microservices.py - Microservices architecture templatetemplates/mobile_app.py - Mobile application threat model templatetemplates/iot_system.py - IoT system threat model templatedfd_styles.json - Custom graphviz styling for professional diagramsfrom pytm import TM, Server, Datastore, Dataflow, Boundary, Actor
tm = TM("Three-Tier Web Application")
# Boundaries
internet = Boundary("Internet")
dmz = Boundary("DMZ")
internal = Boundary("Internal Network")
# Components
user = Actor("End User")
user.inBoundary = internet
lb = Server("Load Balancer")
lb.inBoundary = dmz
lb.implementsNonce = True
web = Server("Web Server")
web.inBoundary = dmz
web.implementsAuthentication = True
web.implementsAuthenticationOut = False
app = Server("Application Server")
app.inBoundary = internal
app.implementsAuthorization = True
db = Datastore("Database")
db.inBoundary = internal
db.isSQL = True
db.isEncryptedAtRest = True
# Data flows
Dataflow(user, lb, "HTTPS").isEncrypted = True
Dataflow(lb, web, "HTTPS").isEncrypted = True
Dataflow(web, app, "HTTP").data = "session token, requests"
Dataflow(app, db, "SQL/TLS").data = "user data, transactions"
tm.process()
from pytm import TM, Lambda, Datastore, Dataflow, Boundary, Actor
tm = TM("Cloud Microservices")
cloud = Boundary("Cloud Provider VPC")
user = Actor("Mobile App")
# Serverless functions
api_gateway = Lambda("API Gateway")
api_gateway.inBoundary = cloud
api_gateway.implementsAPI = True
auth_fn = Lambda("Auth Function")
auth_fn.inBoundary = cloud
# Managed services
cache = Datastore("Redis Cache")
cache.inBoundary = cloud
cache.isEncrypted = True
db = Datastore("DynamoDB")
db.inBoundary = cloud
db.isEncryptedAtRest = True
# Data flows
Dataflow(user, api_gateway, "API Call").protocol = "HTTPS"
Dataflow(api_gateway, auth_fn, "Auth").protocol = "internal"
Dataflow(auth_fn, cache, "Session").isEncrypted = True
Dataflow(api_gateway, db, "Query").isEncrypted = True
tm.process()
Define organization-specific threats:
from pytm import TM, Threat
tm = TM("Custom Threat Model")
# Add custom threat to component
web_server = Server("Web Server")
custom_threat = Threat(
target=web_server,
id="CUSTOM-001",
description="API rate limiting bypass using distributed requests",
condition="web_server.implementsRateLimiting is False",
mitigation="Implement distributed rate limiting with Redis",
references="OWASP API Security Top 10 - API4 Unrestricted Resource Consumption"
)
web_server.threats.append(custom_threat)
Focus on cross-boundary threats:
# Identify all trust boundary crossings
for flow in tm.dataflows:
if flow.source.inBoundary != flow.sink.inBoundary:
print(f"Cross-boundary flow: {flow.name}")
print(f" From: {flow.source.inBoundary.name}")
print(f" To: {flow.sink.inBoundary.name}")
print(f" Encrypted: {flow.isEncrypted}")
print(f" Authentication: {flow.implementsAuthentication}")
Trust boundary crossings require extra scrutiny:
Symptoms: Expected STRIDE threats not appearing in generated report
Solution:
isSQL=True for databases)isEncrypted, protocol)references/stride_methodology.md for threat conditionsSymptoms: DFD not generated or graphviz errors
Solution:
# Verify graphviz installation
dot -V
# Install graphviz if missing
brew install graphviz # macOS
sudo apt-get install graphviz # Linux
# Test pytm with simple model
python -c "from pytm import TM; tm = TM('test'); tm.process()"
Symptoms: Identified threats don't apply to your architecture
Solution:
threat.condition = "..."threat.mitigation = "N/A - using managed service"references/component_library.mdSymptoms: Threat model doesn't reflect current architecture
Solution:
scripts/check_mitigations.py to validate completenessCreate organization-specific threat library:
# custom_threats.py
from pytm import Threat
def add_custom_threats(tm):
"""Add organization-specific threats to threat model"""
# Cloud-specific threats
cloud_misconfiguration = Threat(
id="CLOUD-001",
description="Misconfigured cloud storage bucket exposes sensitive data",
condition="datastore.inBoundary.name == 'Cloud' and not datastore.isEncrypted",
mitigation="Enable encryption at rest and bucket policies"
)
# API-specific threats
api_abuse = Threat(
id="API-001",
description="API endpoint abuse through lack of rate limiting",
condition="server.implementsAPI and not server.implementsRateLimiting",
mitigation="Implement rate limiting and API key rotation"
)
return [cloud_misconfiguration, api_abuse]
Add DREAD scoring to threats:
class ScoredThreat(Threat):
def __init__(self, *args, **kwargs):
super().__init__(*args, **kwargs)
self.damage = 0 # 0-10
self.reproducibility = 0
self.exploitability = 0
self.affected_users = 0
self.discoverability = 0
def dread_score(self):
return (self.damage + self.reproducibility + self.exploitability +
self.affected_users + self.discoverability) / 5
# Usage
threat = ScoredThreat(
target=component,
description="SQL Injection",
damage=9,
reproducibility=8,
exploitability=7,
affected_users=10,
discoverability=6
)
print(f"DREAD Score: {threat.dread_score()}/10")
Customize DFD output with graphviz attributes:
# Set custom colors for trust boundaries
internet.color = "red"
dmz.color = "orange"
internal.color = "green"
# Customize diagram output
tm.graph_options = {
"rankdir": "LR", # Left to right layout
"bgcolor": "white",
"fontname": "Arial",
"fontsize": "12"
}