Produce a STRIDE threat model for a new feature
When to use: Design review for a feature that touches user data, auth, or external networks.
Prerequisites
- Feature design doc or architecture diagram — Paste into chat or point Claude at the file
- Skill installed — git clone https://github.com/eth0izzle/security-skills ~/.claude/skills/security-skills
Flow
-
Walk the systemUse security-skills. Here's the design for [feature]. Enumerate trust boundaries and data flows.✓ Copied→ Named trust boundaries, explicit data flow arrows
-
Apply STRIDEFor each boundary, call out Spoofing, Tampering, Repudiation, Info Disclosure, DoS, Elevation risks.✓ Copied→ Table with threats scored, not generic 'consider XSS'
-
Propose mitigationsRank the threats by likelihood * impact and propose concrete mitigations for the top 5.✓ Copied→ Specific controls (rate limit, signed requests, audit log)
Outcome: A threat model doc ready for a security review meeting.
Pitfalls
- STRIDE becomes checkbox theater — Demand concrete attacker stories — 'attacker with X wants Y, does Z'