Produce a STRIDE threat model for a new feature
何时使用: Design review for a feature that touches user data, auth, or external networks.
前置条件
- Feature design doc or architecture diagram — Paste into chat or point Claude at the file
- Skill installed — git clone https://github.com/eth0izzle/security-skills ~/.claude/skills/security-skills
步骤
-
Walk the systemUse security-skills. Here's the design for [feature]. Enumerate trust boundaries and data flows.✓ 已复制→ Named trust boundaries, explicit data flow arrows
-
Apply STRIDEFor each boundary, call out Spoofing, Tampering, Repudiation, Info Disclosure, DoS, Elevation risks.✓ 已复制→ Table with threats scored, not generic 'consider XSS'
-
Propose mitigationsRank the threats by likelihood * impact and propose concrete mitigations for the top 5.✓ 已复制→ Specific controls (rate limit, signed requests, audit log)
结果: A threat model doc ready for a security review meeting.
注意事项
- STRIDE becomes checkbox theater — Demand concrete attacker stories — 'attacker with X wants Y, does Z'