security-threat-model
Repository-grounded threat modeling that enumerates trust boundaries, assets, attacker capabilities, abuse paths, and mitigations, and writes a concise Markdown threat model. Trigger only when the use
Install on your platform
We auto-selected OpenClaw based on this skill’s supported platforms.
About This Skill
What it does
This skill generates comprehensive security threat models based on provided repository context. It automatically identifies trust boundaries, critical assets within a system, potential attacker capabilities, possible abuse pathways, and suggests corresponding mitigation strategies. The output is formatted as a concise Markdown document, facilitating easy review and integration into existing documentation.
When to use it
- New Project Planning: Generate an initial threat model during the design phase of a new software project to proactively identify potential security risks.
- Codebase Review: Analyze an existing codebase to uncover vulnerabilities and weaknesses that might be exploited by attackers.
- Security Audits: Supplement manual security audits with automated threat modeling for broader coverage and faster analysis.
- Risk Assessment: Quickly assess the overall security posture of a system or application based on identified threats and mitigations.
Key capabilities
- Enumerates trust boundaries within a repository.
- Identifies critical assets requiring protection.
- Lists potential attacker capabilities.
- Maps abuse paths detailing how attackers might exploit vulnerabilities.
- Proposes mitigation strategies to address identified risks.
- Generates Markdown formatted threat model output.
Example prompts
- "Generate a threat model for this repository: [repository URL]"
- "Threat model the following code, focusing on potential data leakage: [code snippet]"
- “Create a security threat model for the authentication module in this project.”
Tips & gotchas
The skill's effectiveness is directly tied to the quality and completeness of the repository context provided. Ensure the input repository accurately reflects the system being analyzed for optimal results.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
Details
- Version
- v1.0.0
- License
- MIT
- Author
- openai
- Installs
- 0
🏢 Official
Published by the company or team that built the technology.