From nickcrew-claude-ctx-plugin
Applies STRIDE, attack trees, DREAD scoring, and five-stage process to identify threats, assess risks, and design mitigations for secure systems and architecture reviews.
npx claudepluginhub nickcrew/claude-cortexThis skill uses the workspace's default tool permissions.
Systematic framework for identifying, analyzing, and mitigating security threats during system design and architecture phases using proven methodologies like STRIDE, attack trees, and risk assessment frameworks.
references/attack-trees.mdreferences/data-flow-diagrams.mdreferences/dread-scoring.mdreferences/mitigation-strategies.mdreferences/stride-disclosure.mdreferences/stride-dos.mdreferences/stride-elevation.mdreferences/stride-repudiation.mdreferences/stride-spoofing.mdreferences/stride-tampering.mdreferences/tools-and-process.mdPerforms threat modeling with STRIDE, PASTA, attack trees; reviews security architecture, extracts requirements, prioritizes risks, designs mitigations for secure-by-design systems.
Guides threat modeling using STRIDE, DREAD, attack trees, DFDs, and trust boundaries to identify, prioritize, and mitigate security risks in software design and SDLC.
Conducts threat modeling with STRIDE, PASTA, attack trees; reviews security architecture, assesses risks, extracts requirements for secure systems.
Share bugs, ideas, or general feedback.
Systematic framework for identifying, analyzing, and mitigating security threats during system design and architecture phases using proven methodologies like STRIDE, attack trees, and risk assessment frameworks.
Five-Stage Threat Modeling Process:
| Task | Load reference |
|---|---|
| STRIDE: Spoofing Identity | skills/threat-modeling-techniques/references/stride-spoofing.md |
| STRIDE: Tampering with Data | skills/threat-modeling-techniques/references/stride-tampering.md |
| STRIDE: Repudiation | skills/threat-modeling-techniques/references/stride-repudiation.md |
| STRIDE: Information Disclosure | skills/threat-modeling-techniques/references/stride-disclosure.md |
| STRIDE: Denial of Service | skills/threat-modeling-techniques/references/stride-dos.md |
| STRIDE: Elevation of Privilege | skills/threat-modeling-techniques/references/stride-elevation.md |
| Attack Trees | skills/threat-modeling-techniques/references/attack-trees.md |
| Data Flow Diagrams (DFD) | skills/threat-modeling-techniques/references/data-flow-diagrams.md |
| DREAD Risk Scoring | skills/threat-modeling-techniques/references/dread-scoring.md |
| Mitigation Strategies | skills/threat-modeling-techniques/references/mitigation-strategies.md |
| Tools & Process | skills/threat-modeling-techniques/references/tools-and-process.md |
STRIDE categorizes threats into six types:
Apply STRIDE to:
Hierarchical diagrams showing attack paths from goals to methods:
[Root: Attack Goal]
|
+-- [OR] Method 1 (alternative paths)
| |
| +-- [AND] Required Step 1.1
| +-- [AND] Required Step 1.2
|
+-- [OR] Method 2 (alternative paths)
Use attack trees to:
DREAD quantifies threat severity (each criterion scored 0-10, average = risk score):
Risk Levels:
Lines separating different trust levels:
At each boundary, verify:
Avoid:
Team Involvement:
Process Integration:
Microsoft Threat Modeling Tool: Visual DFD editor, automated STRIDE threat generation OWASP Threat Dragon: Open source, cross-platform, web and desktop versions IriusRisk: Commercial platform, DevSecOps integration, compliance mapping ThreatModeler: Collaborative, cloud architecture support