From argos
STRIDE bazlı threat modeling — asset inventory, trust boundary, data flow diagram, abuse case, risk skoru (DREAD/CVSS), mitigation tracking. Security review'un proaktif yüzü.
npx claudepluginhub resultakak/argos --plugin argosThis skill uses the workspace's default tool permissions.
`agents/shared/severity-rubric.md` ve `agents/shared/escalation-matrix.md` default-load
Mandates invoking relevant skills via tools before any response in coding sessions. Covers access, priorities, and adaptations for Claude Code, Copilot CLI, Gemini CLI.
Share bugs, ideas, or general feedback.
agents/shared/severity-rubric.md ve agents/shared/escalation-matrix.md default-load
sayılır (agents/coordination.md §11). Bu skill'in çıktısı Critical / High / Medium /
Low + kanıt formatında olmak zorunda — spekülatif Critical yasak. Sahiplik dışı bulgu
ilgili agent'a delege; karar yetkisi eşiği aşılırsa kullanıcı onayı zorunlu.
| Asset | Türü | Hassasiyet | Sahip |
|---|---|---|---|
| Customer PII (email, address) | Veri | High | data-team |
| Payment card data (PCI) | Veri | Critical | payments-team |
| API auth tokens | Veri | High | platform-team |
| Internal admin endpoint | Yetenek | High | platform-team |
| Public product catalog | Veri | Low | api-team |
| Order DB (postgres) | Sistem | Critical | api-team |
Hassasiyet = Critical / High / Medium / Low. Veri tipi (PII / PHI / PCI / IP / public) belirleyici.
Trust boundary: farklı güven seviyesindeki bölgeler arası sınır (internet ↔ DMZ ↔ internal network ↔ database).
[Internet]
│ (TLS 1.3)
▼
┌─────────────────────┐
│ API Gateway │ trust boundary 1
│ (rate limit, JWT) │
└────────┬────────────┘
│ (mTLS)
▼
┌─────────────────────┐
│ api-svc │ trust boundary 2
│ (RBAC enforced) │
└─────┬───────────────┘
│ (TLS, read-only DB user)
▼
┌─────────────────────┐
│ postgres-rw │ trust boundary 3
│ (network policy) │
└─────────────────────┘
DFD elementler: External entity / Process / Data store / Data flow. Her data flow: protocol + auth + encryption.
| Tehdit | Hedef | Soru | Karşı önlem |
|---|---|---|---|
| S poofing | Identity | "Kim olduğunu kanıtlıyor mu?" | mTLS, JWT signature, MFA, OIDC |
| T ampering | Data integrity | "Veri yolda/depoda değişti mi?" | TLS, HMAC, signing, immutable log |
| R epudiation | Accountability | "Kim ne yaptı kanıtlanır mı?" | audit log, append-only, signed entry |
| I nformation disclosure | Confidentiality | "Sızıyor mu?" | encryption (rest+transit), access control, PII redact |
| D enial of service | Availability | "Çökertilebilir mi?" | rate limit, autoscale, circuit breaker, queue depth |
| E levation of privilege | Authorization | "Yetki yükseltilebilir mi?" | RBAC, principle of least privilege, JIT access |
Her STRIDE kategorisi için abuse case yaz:
**Threat**: Spoofing — attacker JWT token'ı kopyalayıp başka kullanıcı gibi
istek atabilir.
**Vector**: log'da plaintext JWT, session cookie HttpOnly değil.
**Impact**: Account takeover (Critical).
**Likelihood**: High (log'a okuma yetkisi 12 internal user'da var).
**Risk**: Critical.
**Mitigation**:
1. JWT log'a yazılmıyor (PII redact middleware).
2. Cookie HttpOnly + Secure + SameSite=Strict.
3. Token refresh + short TTL (15 dk access, 7d refresh).
4. Anomaly detection (yeni IP/device).
**Residual risk**: Low (mitigation sonrası).
**Owner**: @security-team.
**Issue**: #4321.
DREAD (basit) veya CVSS (standart):
DREAD (her boyut 1-10):
CVSS 3.1 (sektör standardı): base score (impact × exploitability) + temporal + environmental.
Plugin tercih: CVSS — daha yapılandırılmış.
| Risk | Mitigation | Sahip | Bitiş | Issue | Status |
|---|---|---|---|---|---|
| JWT spoofing | PII redact + cookie hardening + short TTL | @security | 2026-05-21 | #4321 | open |
| Order DB DoS | rate limit + connection pool cap | @platform | 2026-05-28 | #4322 | open |
| Admin endpoint EoP | mTLS + IP allowlist | @platform | 2026-06-04 | #4323 | open |
Risk kabul edilebilir (residual = mevcut, mitigation maliyetli) — yazılı kabul + sahibi.
GDPR/CCPA hassasiyetinde:
docs/threat-model/<service>.md.User: /threat-model api-svc
Agent (security-reviewer):
1. Scope: api-svc + bağımlılıkları (postgres, redis, payment-provider).
2. Asset: PII (email/address), Payment (PCI scope), JWT, admin endpoint.
3. DFD: 3 trust boundary (Internet → APIGW → api-svc → DB).
4. STRIDE per component (15 madde):
- S: JWT spoofing (Critical)
- T: webhook signature yok (High)
- R: audit log immutable değil (Medium)
- I: log'da plaintext email (Critical — PII)
- D: rate limit yok admin endpoint (High)
- E: SSO eksik admin (High)
- ... 9 daha
5. Abuse case: 6 madde detay (vector + impact + likelihood + mitigation).
6. CVSS skor: 4 Critical (>9.0), 5 High, 4 Medium, 2 Low.
7. Mitigation: 11 issue açıldı, sahip + tarih.
8. Residual: 2 risk kabul edildi (cost-benefit) — yazılı imza.
9. Output: `docs/threat-model/api-svc.md` doldurulmuş template +
issue link tablosu + DFD diagram.
10. Review cadence: 6 ay sonra (2026-11-10) + tasarım değiştiğinde.
# Threat Model: <service>
## Scope + Audience
## Asset Inventory
## DFD + Trust Boundary
## STRIDE Matrix
## Abuse Cases
## Risk Skor (CVSS)
## Mitigation Tablosu
## Residual Risk
## Kabul Edilen Risk (varsa)
## Review Cadence