Back to tags
Tag

Agent Skills with tag: threat-modeling

11 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

threat-modeling-techniques

Threat modeling methodologies using STRIDE, attack trees, and risk assessment for proactive security analysis. Use when designing secure systems, conducting security reviews, or identifying potential attack vectors in applications.

stride-threat-modelingattack-treesrisk-assessmentthreat-modeling
NickCrew
NickCrew
52

security-prompts

Library of battle-tested security prompt templates for secure feature implementation. Use when implementing forms, endpoints, authentication, authorization, file uploads, or conducting security reviews. Triggers include "security prompt", "secure form", "RBAC", "threat model", "STRIDE", "admin endpoint", "file upload", "security testing", "code review", "OWASP".

security-testingOWASPRBACfile-upload
harperaa
harperaa
1

system-design

System design, software architecture, API design, cybersecurity, and threat modeling. Build secure, scalable systems.

software-designapi-designsecurityscalability
pluginagentmarketplace
pluginagentmarketplace
11

testing-methodologies

Structured approaches for AI security testing including threat modeling, penetration testing, and red team operations

threat-modelingpenetration-testingred-teamsecurity-testing
pluginagentmarketplace
pluginagentmarketplace
1

vulnerability-discovery

Systematic vulnerability finding, threat modeling, and attack surface analysis for AI/LLM security assessments

vulnerability-scanningthreat-modelingattack-surface-mappingAI-security
pluginagentmarketplace
pluginagentmarketplace
1

security-architecture

Design security architectures with threat modeling and zero trust

security-architecturethreat-modelingzero-trustsecurity-policies
pluginagentmarketplace
pluginagentmarketplace
1

Security Architect

Comprehensive security architecture combining threat modeling, security-first design, secure coding review, and compliance validation. Consolidated from threat-modeling, security-first-design, secure-coding-review, and compliance-validator.

security-architecturethreat-modelingsecure-coding-reviewcompliance-validation
daffy0208
daffy0208
55

threat-model

Threat modeling methodologies (STRIDE, DREAD, PASTA, attack trees) for secure architecture design. Use when planning new systems, reviewing architecture security, identifying threats, or assessing risk. Triggers: threat model, STRIDE, DREAD, attack surface, security architecture, trust boundary, threat vector, risk assessment.

threat-modelingSTRIDEDREADattack-trees
cosmix
cosmix
3

security-threat-model

Use when designing or reviewing systems handling sensitive data (PII, PHI, financial, auth credentials), building features with security implications (auth, payments, file uploads, APIs), preparing for security audits or compliance (PCI, HIPAA, SOC 2), investigating security incidents, integrating third-party services, or when user mentions "threat model", "security architecture", "STRIDE", "trust boundaries", "attack surface", or "security review".

threat-modelingattack-surface-mappingrisk-assessmentcompliance-audit
lyndonkl
lyndonkl
82

security-stride-methodology

Activate when conducting security analysis using STRIDE threat modeling, vulnerability assessment, and security architecture evaluation

threat-modelingstride-threat-modelingvulnerability-assessmentsecurity-architecture
vinnie357
vinnie357
122

fabric

Intelligent pattern selection for Fabric CLI. Automatically selects the right pattern from 242+ specialized prompts based on your intent - threat modeling, analysis, summarization, content creation, extraction, and more. USE WHEN processing content, analyzing data, creating summaries, threat modeling, or transforming text.

cliprompt-engineeringcontent-processingsummarization
danielmiessler
danielmiessler
305