Awesome-omni-skill Threat Model
Conduct STRIDE-based threat modeling for system components and data flows
install
source · Clone the upstream repo
git clone https://github.com/diegosouzapw/awesome-omni-skill
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/diegosouzapw/awesome-omni-skill "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/testing-security/threat-model" ~/.claude/skills/diegosouzapw-awesome-omni-skill-threat-model-bb0534 && rm -rf "$T"
manifest:
skills/testing-security/threat-model/SKILL.mdsource content
Threat Model Skill
Conduct STRIDE-based threat modeling for system components and data flows.
Trigger Conditions
- New ingress points are added (APIs, webhooks, queue consumers)
- Authentication or authorization changes are made
- User invokes with "threat model" or "security assessment"
Input Contract
- Required: System or component to model
- Required: Data flow diagram or description
- Optional: Trust boundaries, existing security controls
Output Contract
- STRIDE analysis per component
- Risk matrix (likelihood × impact)
- Prioritized mitigation recommendations
- Attack tree for highest-risk threats
Tool Permissions
- Read: All source code, config files, API specs, network policies
- Write:
directorydocs/security/ - Search: Codebase for security-relevant patterns
Execution Steps
- Map the system's data flow diagram
- Identify trust boundaries
- Apply STRIDE to each component crossing a trust boundary
- Assess likelihood and impact for each threat
- Prioritize threats by risk score
- Recommend mitigations for top threats
- Document in threat model report
Success Criteria
- Every ingress point has been analyzed
- STRIDE applied to all trust boundary crossings
- Risk matrix populated with scores
- Top 5 threats have concrete mitigation recommendations
Escalation Rules
- Escalate if a Critical-severity threat is identified
- Escalate if existing controls are insufficient for a High-risk threat
- Escalate if the threat requires infrastructure-level changes
Example Invocations
Input: "Threat model the new webhook ingestion endpoint"
Output: STRIDE analysis: Spoofing (no HMAC verification — HIGH), Tampering (no request body signing — MEDIUM), Repudiation (no audit log — MEDIUM), Information Disclosure (error messages leak internals — LOW), DoS (no rate limiting — HIGH), EoP (webhook can trigger admin actions — CRITICAL). Mitigation plan prioritized.