From soundcheck
Applies threat modeling checklist to implementation plans for new features, APIs, data pipelines, or components, checking trust boundaries, auth, data flows, rate limits, and abuse prevention.
npx claudepluginhub thejefflarson/soundcheck --plugin soundcheckThis skill uses the workspace's default tool permissions.
Surfaces missing controls before implementation. Auth gaps, unprotected data flows,
Generates concrete, developer-focused threat models for features, components, or systems, with attack scenarios, risks, and actionable mitigations.
Conducts STRIDE threat modeling with DFD trust boundaries and DREAD scoring for auth, file uploads, payments, webhooks, OAuth, APIs, CI/CD, and security reviews of user data handling.
Identifies vulnerabilities, threats, and mitigations using STRIDE methodology, trust boundary mapping, and defense-in-depth for systems handling PII, auth, payments, APIs.
Share bugs, ideas, or general feedback.
Surfaces missing controls before implementation. Auth gaps, unprotected data flows, and absent rate limiting are cheaper to fix in a plan than in code.
Answer each question; add missing controls as explicit plan steps before continuing.
Security design checklist:
TRUST BOUNDARIES
[ ] What inputs cross a trust boundary? Are they validated before use?
[ ] Does any step pass user-supplied data to a database, shell, or template?
DATA FLOWS
[ ] Does any step persist or transmit PII, credentials, or secrets?
[ ] Are those flows encrypted in transit and at rest?
ACCESS CONTROL
[ ] Does every new endpoint require authentication?
[ ] Are permissions checked at the resource level, not just the route?
ABUSE PREVENTION
[ ] Does every user-facing endpoint have rate limits?
[ ] Any irreversible action without a confirmation gate?
REPUDIATION
[ ] Are auth events, permission changes, and deletions logged with actor and timestamp?
[ ] Are those logs write-only or tamper-evident?
RESOURCE LIMITS
[ ] Does each request have a compute or memory cost cap?
[ ] Are expensive operations protected by timeouts and circuit breakers?
EXTERNAL BOUNDARIES
[ ] Are inputs from external services validated before use?
[ ] Are timeouts and error responses defined for every external call?
Confirm: