Back to tags
Tag

Agent Skills with tag: threat-modeling

4 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

threat-modeling-techniques

Threat modeling methodologies using STRIDE, attack trees, and risk assessment for proactive security analysis. Use when designing secure systems, conducting security reviews, or identifying potential attack vectors in applications.

stride-threat-modelingattack-treesrisk-assessmentthreat-modeling
NickCrew
NickCrew
52

security-prompts

Library of battle-tested security prompt templates for secure feature implementation. Use when implementing forms, endpoints, authentication, authorization, file uploads, or conducting security reviews. Triggers include "security prompt", "secure form", "RBAC", "threat model", "STRIDE", "admin endpoint", "file upload", "security testing", "code review", "OWASP".

security-testingOWASPRBACfile-upload
harperaa
harperaa
1

system-design

System design, software architecture, API design, cybersecurity, and threat modeling. Build secure, scalable systems.

software-designapi-designsecurityscalability
pluginagentmarketplace
pluginagentmarketplace
11

security-threat-model

Use when designing or reviewing systems handling sensitive data (PII, PHI, financial, auth credentials), building features with security implications (auth, payments, file uploads, APIs), preparing for security audits or compliance (PCI, HIPAA, SOC 2), investigating security incidents, integrating third-party services, or when user mentions "threat model", "security architecture", "STRIDE", "trust boundaries", "attack surface", or "security review".

threat-modelingattack-surface-mappingrisk-assessmentcompliance-audit
lyndonkl
lyndonkl
0