security/threat-model
Threat Modeling security skill
$ 安裝
git clone https://github.com/mgreenly/ikigai /tmp/ikigai && cp -r /tmp/ikigai/.claude/library/security/threat-model ~/.claude/skills/ikigai// tip: Run this command in your terminal to install the skill
SKILL.md
name: security/threat-model description: Threat Modeling security skill
Threat Modeling
Identify attack surface, enumerate threats, prioritize mitigations before writing code.
Process for Planned Work
1. Identify assets:
- What are we protecting? (API keys, conversation history, user data)
- What would attacker want? (credentials, code execution, data exfil)
2. Enumerate entry points:
- User input (terminal, config, environment)
- Network (LLM API responses)
- Filesystem (config files, database)
3. Apply STRIDE per entry point:
- Spoofing: Can attacker impersonate?
- Tampering: Can attacker modify data?
- Repudiation: Can actions be denied?
- Information disclosure: Can secrets leak?
- Denial of service: Can availability be impacted?
- Elevation of privilege: Can attacker gain capabilities?
4. Prioritize:
- Likelihood × Impact = Risk
- Address high-risk items first
- Document accepted risks
For new features ask:
- What new entry points does this create?
- What can go wrong if input is malicious?
- What's the blast radius if this component is compromised?
Repository

mgreenly
Author
mgreenly/ikigai/.claude/library/security/threat-model
1
Stars
0
Forks
Updated4d ago
Added1w ago