From bitwarden-security-engineer
This skill should be used when the user asks to "create a threat model", "define security goals", "generate a data flow diagram", "write security definitions", "perform an initial security assessment", or needs to produce threat model artifacts for new features or architecture changes.
npx claudepluginhub bitwarden/ai-plugins --plugin bitwarden-security-engineerThis skill uses the workspace's default tool permissions.
Bitwarden follows a 4-phase engagement model for security work. This skill primarily supports Phase 1 (engineering-owned) and assists with Phase 2-4 artifacts.
Performs threat modeling with STRIDE, PASTA, attack trees; reviews security architecture, extracts requirements, prioritizes risks, designs mitigations for secure-by-design systems.
Conducts threat modeling using STRIDE, PASTA, attack trees; performs security architecture reviews, risk assessments, and extracts security requirements for secure-by-design systems.
Generates threat models using OWASP Four-Question Framework and STRIDE methodology, producing matrices with risk ratings, mitigations, and prioritization for attack surface analysis and security reviews.
Share bugs, ideas, or general feedback.
Bitwarden follows a 4-phase engagement model for security work. This skill primarily supports Phase 1 (engineering-owned) and assists with Phase 2-4 artifacts.
references/stride-framework.md)Security definitions are Bitwarden's formal construct for communicating the security posture of a system. Each definition has three components: a threat model (attacker capabilities), security goals (what the system guarantees), and an accepted goal status (honest assessment of whether the goal is currently met).
Use Bitwarden's standard vocabulary when writing definitions — see references/bitwarden-vocabulary.md for the full glossary. Align security goals with Bitwarden's security principles (P01-P06) — see references/security-principles.md.
Describe attacker capabilities AND limitations — what they can and cannot do. Always state both sides to scope the definition precisely:
Include concrete examples where helpful (e.g., "An example for this is a stolen device"). Don't assume external mitigations are in place — even if obtaining an auth token is difficult, still explore what happens if an attacker has one.
State concise, testable guarantees about what cannot happen given the threat model. Reference specific assets (tokens, keys, vault data):
Provide an honest assessment of the current state:
When a goal is known to be broken, link to the relevant tracking issue. Note scoping caveats (e.g., "These definitions do not apply in the case of a Vault Timeout set to Never").
Use the templates in examples/ when generating artifacts:
examples/security-definition-document.md — Full SD document template with glossary, numbered definitions, and accepted goal statusexamples/data-flow-diagram.md — Mermaid DFD template with trust boundariesexamples/threat-catalog.md — Threat catalog table and mitigation tracking templatesTeams should initiate a full engagement with the AppSec team (#team-eng-appsec) when:
Quick questions (e.g., concerns about a third-party library or coding practice) don't need a full engagement — post those directly to #team-eng-appsec.