From appsec
This skill should be used when the user asks to "analyze threats", "identify threat actors", "map attack vectors", "cross-reference MITRE ATT&CK", or is running PASTA stage 4. Also triggers when the user asks about adversary tactics, supply chain threats, or threat intelligence in a threat modeling context. Part of the PASTA threat modeling methodology (Stage 4 of 7).
npx claudepluginhub florianbuetow/claude-code --plugin appsecThis skill uses the workspace's default tool permissions.
Identify threats using real-world intelligence, attack patterns, and adversary
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Identify threats using real-world intelligence, attack patterns, and adversary tactics. Cross-reference with MITRE ATT&CK to ground analysis in actual attacker behavior. Map threats to the components and trust boundaries from Stage 3.
Read ../../shared/schemas/flags.md for the full flag specification. Key behaviors:
| Flag | Stage 4 Behavior |
|---|---|
--scope | Inherits from prior stages. Focuses on components and entry points from Stages 2-3. |
--depth quick | Top 5 most likely threats based on technology stack only. |
--depth standard | Full threat catalog with MITRE ATT&CK mappings for all components. |
--depth deep | Standard + attack tree construction, supply chain analysis, insider threat modeling. |
--depth expert | Deep + adversary persona simulation with detailed TTPs per actor profile. |
--severity | Filter threats by estimated impact level. |
Read ../../shared/frameworks/pasta.md, Stage 4 section. PASTA is SEQUENTIAL.
Stage 4 consumes Stages 1-3 output and feeds Stage 5.
Required: Stage 3 output -- component inventory, role-permission matrix, data classification, trust boundaries. Also needs: business-critical assets (Stage 1), entry points and attack surface (Stage 2). If unavailable, warn and assume.
| Technique | Name | Relevance |
|---|---|---|
| T1190 | Exploit Public-Facing App | Internet-facing endpoints |
| T1059 | Command/Scripting Interpreter | Server-side execution paths |
| T1078 | Valid Accounts | Authentication mechanisms |
| T1098 | Account Manipulation | User/role management |
| T1134 | Access Token Manipulation | JWT/session handling |
| T1552 | Unsecured Credentials | Secrets in config files |
| T1210 | Exploit Remote Services | Service-to-service calls |
| T1195 | Supply Chain Compromise | Third-party dependencies |
For each component: review stack-specific attack history, map patterns to entry points, assess feasibility given controls, and identify cross-component chains.
Check dependency manifests for count, known CVEs (via SCA tooling), undermaintained packages, typosquatting risk, and CI/CD pipeline security.
Map each threat to target component(s), exploited entry point(s), and endangered business asset(s).
Stage 4 produces a Threat Catalog. ID prefix: PASTA (e.g., PASTA-S4-001).
## PASTA Stage 4: Threat Analysis
### Threat Actor Profiles
| Actor | Motivation | Capability | Likely Targets | Likelihood |
|-------|-----------|-----------|---------------|------------|
| Opportunistic | Financial gain | Low-Med | Known CVEs, weak auth | High |
| Targeted | Data theft | Med-High | Business logic, APIs | Medium |
| Insider | Revenge/profit | High | Data exfil, backdoors | Low-Med |
| Supply chain | Broad compromise | Medium | Dependencies, CI/CD | Low |
### Threat Catalog
| ID | Threat | MITRE ATT&CK | Component | Asset | Likelihood |
|----|--------|-------------|-----------|-------|------------|
| T-01 | SQL injection via search | T1190 | C-02 API | User DB | High |
| T-02 | Credential stuffing | T1078 | C-01 Auth | Accounts | High |
### Attack Trees (--depth deep+)
Goal: Access customer payment data
OR
+-- Exploit SQL injection -> extract tokens -> impersonate admin
+-- Credential stuff admin login -> access /admin/export
+-- Compromise npm dependency -> backdoor payment module
### Supply Chain Assessment
| Dependency | Risk | CVEs Known | Maintainer Status |
|-----------|------|-----------|------------------|
Findings follow ../../shared/schemas/findings.md with:
references.mitre_attck: Technique ID (e.g., "T1190")metadata.tool: "pasta-threats", metadata.framework: "pasta", metadata.category: "Stage-4"Stage 5: Vulnerability Analysis (pasta-vulns). Pass the Threat Catalog and
MITRE ATT&CK mappings. Stage 5 analyzes code for specific vulnerabilities that
enable the threats identified here.