What This Skill Does
Repository-grounded threat modeling that analyzes code to enumerate trust boundaries, assets, attacker capabilities, and abuse paths. Produces a concise Markdown threat model.
When to Use It
- Threat modeling a codebase or specific code path
- Enumerating potential abuse paths and attack vectors
- AppSec threat modeling for new features or services
- Identifying trust boundaries in your architecture
Output Structure
Best Practices
- Threat model early in the design phase, not after shipping
- Focus on the highest-impact abuse paths first
- Review and update threat models when architecture changes