Activate when conducting security analysis using STRIDE threat modeling, vulnerability assessment, and security architecture evaluation
Conducts comprehensive security analysis using the STRIDE threat modeling framework. Activates when you need to evaluate security architecture, identify vulnerabilities, or create threat model diagrams for applications and systems.
/plugin marketplace add vinnie357/claudio/plugin install claudio@vinnie357This skill inherits all available tools. When active, it can use any tool Claude has access to.
Guide for comprehensive security analysis using the STRIDE threat modeling framework, vulnerability assessment, and security architecture evaluation.
Activate when:
STRIDE categorizes security threats into six categories:
Identity theft/impersonation threats
Data modification threats
Deniability threats
Data exposure threats
Availability threats
Authorization bypass threats
## Threat: [STRIDE Category] - [Threat Name]
### Description
[Detailed threat description]
### Attack Vector
[How the attack could be executed]
### Affected Components
- [Component 1]
- [Component 2]
### Risk Assessment
- **Likelihood**: High/Medium/Low
- **Impact**: High/Medium/Low
- **Risk Score**: [Likelihood × Impact]
### Mitigation
- [Mitigation step 1]
- [Mitigation step 2]
### Verification
- [How to verify mitigation is effective]
graph LR
A[User] -->|HTTPS| B[Load Balancer]
B -->|Internal| C[App Server]
C -->|Query| D[(Database)]
C -->|API| E[External Service]
style B fill:#f9f,stroke:#333
style D fill:#bbf,stroke:#333
graph TB
subgraph "Untrusted Zone"
A[Internet Users]
end
subgraph "DMZ"
B[Web Server]
end
subgraph "Trusted Zone"
C[App Server]
D[(Database)]
end
A --> B
B --> C
C --> D
# Security Assessment Report
## Executive Summary
- **Overall Risk Level**: [Critical/High/Medium/Low]
- **Critical Issues**: [Count]
- **High Issues**: [Count]
- **Recommendations**: [Top 3 actions]
## Threat Model Analysis
### STRIDE Coverage
- Spoofing: [Finding count]
- Tampering: [Finding count]
- Repudiation: [Finding count]
- Information Disclosure: [Finding count]
- Denial of Service: [Finding count]
- Elevation of Privilege: [Finding count]
## Architecture Diagram
[Mermaid diagram with trust boundaries]
## Findings
### Critical
1. [Finding with STRIDE category]
### High Priority
1. [Finding with STRIDE category]
## Remediation Roadmap
### Immediate (0-7 days)
- [Action items]
### Short-term (1-4 weeks)
- [Action items]
### Long-term (1-3 months)
- [Action items]
Creating algorithmic art using p5.js with seeded randomness and interactive parameter exploration. Use this when users request creating art using code, generative art, algorithmic art, flow fields, or particle systems. Create original algorithmic art rather than copying existing artists' work to avoid copyright violations.
Applies Anthropic's official brand colors and typography to any sort of artifact that may benefit from having Anthropic's look-and-feel. Use it when brand colors or style guidelines, visual formatting, or company design standards apply.
Create beautiful visual art in .png and .pdf documents using design philosophy. You should use this skill when the user asks to create a poster, piece of art, design, or other static piece. Create original visual designs, never copying existing artists' work to avoid copyright violations.