General

Threat Modeling - Claude MCP Skill

Systematic approach to identifying, analyzing, and mitigating security threats in systems and applications

SEO Guide: Enhance your AI agent with the Threat Modeling tool. This Model Context Protocol (MCP) server allows Claude Desktop and other LLMs to systematic approach to identifying, analyzing, and mitigating security threats in systems and applic... Download and configure this skill to unlock new capabilities for your AI workflow.

🌟1 stars • 0 forks
šŸ“„0 downloads

Documentation

SKILL.md
# Threat Modeling Skill

This skill provides systematic threat modeling capabilities using industry-standard methodologies to identify, analyze, and prioritize security threats in complex systems.

## Core Capabilities

### 1. Threat Identification
- **Asset Inventory**: Critical data, systems, and processes
- **Attack Surface Mapping**: Entry points and interfaces
- **Threat Actor Profiling**: Capabilities, motivations, and resources
- **Attack Vector Analysis**: Potential paths to compromise

### 2. Risk Assessment
- **Likelihood Evaluation**: Probability of successful attacks
- **Impact Analysis**: Business and technical consequences
- **Risk Prioritization**: Cost-benefit analysis for mitigations
- **Quantitative Modeling**: Expected annual loss calculations

### 3. Mitigation Strategy
- **Control Selection**: Preventive, detective, and corrective controls
- **Defense in Depth**: Layered security architecture
- **Residual Risk**: Remaining risk after mitigations
- **Continuous Monitoring**: Threat landscape evolution

### 4. Documentation & Communication
- **Threat Models**: Visual representations and narratives
- **Risk Registers**: Centralized risk tracking
- **Security Requirements**: Derived from threat analysis
- **Executive Reporting**: Business-focused risk communication

## Threat Modeling Methodologies

### STRIDE Framework
```
SPOOFING
ā”œā”€ā”€ Identity spoofing attacks
ā”œā”€ā”€ Authentication bypass
ā”œā”€ā”€ Impersonation threats
└── Credential theft scenarios

TAMPERING
ā”œā”€ā”€ Data integrity attacks  
ā”œā”€ā”€ Man-in-the-middle
ā”œā”€ā”€ Code injection
└── Configuration manipulation

REPUDIATION
ā”œā”€ā”€ Non-repudiation failures
ā”œā”€ā”€ Log tampering
ā”œā”€ā”€ Audit trail gaps
└── Transaction disputes

INFORMATION DISCLOSURE
ā”œā”€ā”€ Data exposure
ā”œā”€ā”€ Privacy violations
ā”œā”€ā”€ Information leakage
└── Unauthorized access

DENIAL OF SERVICE
ā”œā”€ā”€ Resource exhaustion
ā”œā”€ā”€ Service disruption
ā”œā”€ā”€ Availability attacks
└── Performance degradation

ELEVATION OF PRIVILEGE
ā”œā”€ā”€ Privilege escalation
ā”œā”€ā”€ Authorization bypass
ā”œā”€ā”€ Administrative access
└── System compromise
```

### PASTA (Process for Attack Simulation and Threat Analysis)
```
Stage 1: Define Objectives
• Business impact analysis
• Compliance requirements
• Security objectives
• Success criteria

Stage 2: Define Technical Scope  
• Application architecture
• Technology stack
• Network topology
• Data flows

Stage 3: Application Decomposition
• Use cases and user roles
• Entry and exit points
• Trust boundaries
• Dependencies

Stage 4: Threat Analysis
• Attack scenarios
• Threat agent capabilities
• Attack vectors
• Vulnerability correlation

Stage 5: Weakness Analysis
• Design flaws
• Implementation bugs
• Configuration errors
• Process weaknesses

Stage 6: Attack Modeling
• Attack trees
• Kill chains
• Attack scenarios
• Exploitation paths

Stage 7: Risk Analysis
• Business impact
• Technical impact
• Likelihood assessment
• Risk scoring
```

## Threat Modeling Process

### Phase 1: System Understanding
```
Architecture Analysis:
• System boundaries and scope
• Data flow diagrams (DFDs)
• Trust boundaries identification
• External dependencies mapping

Components Inventory:
• Web servers and applications
• Databases and data stores
• Network infrastructure
• Third-party services
• Human processes

Data Classification:
• Sensitive data identification
• Data flow mapping
• Storage locations
• Processing activities
• Retention requirements
```

### Phase 2: Threat Identification
```
Threat Enumeration:
Using STRIDE per element:

Process Threats:
ā”œā”€ā”€ Spoofing: Fake service instances
ā”œā”€ā”€ Tampering: Code injection attacks
ā”œā”€ā”€ Repudiation: Log manipulation
ā”œā”€ā”€ Information Disclosure: Memory dumps
ā”œā”€ā”€ Denial of Service: Resource exhaustion
└── Elevation of Privilege: Buffer overflows

Data Store Threats:
ā”œā”€ā”€ Spoofing: Rogue databases
ā”œā”€ā”€ Tampering: Direct DB access
ā”œā”€ā”€ Repudiation: Audit trail gaps
ā”œā”€ā”€ Information Disclosure: Data dumps
ā”œā”€ā”€ Denial of Service: Storage exhaustion
└── Elevation of Privilege: DB admin access

Data Flow Threats:
ā”œā”€ā”€ Spoofing: Man-in-the-middle
ā”œā”€ā”€ Tampering: Packet modification
ā”œā”€ā”€ Repudiation: Message alteration
ā”œā”€ā”€ Information Disclosure: Eavesdropping
ā”œā”€ā”€ Denial of Service: Connection flooding
└── Elevation of Privilege: Protocol exploits
```

### Phase 3: Risk Analysis
```
Likelihood Assessment:
• Threat actor capabilities
• Attack complexity
• Required resources
• Detection probability
• Success rate

Impact Assessment:
• Confidentiality impact
• Integrity impact  
• Availability impact
• Business disruption
• Regulatory violations
• Reputation damage

Risk Calculation:
Risk = Likelihood Ɨ Impact Ɨ Vulnerability

Where:
• Likelihood: 1-5 scale (Very Low to Very High)
• Impact: 1-5 scale (Minimal to Catastrophic)  
• Vulnerability: 0.1-1.0 (Well Protected to Exposed)
```

### Phase 4: Mitigation Planning
```
Control Categories:

PREVENTIVE CONTROLS:
• Input validation
• Authentication mechanisms
• Authorization checks
• Encryption implementation
• Network segmentation

DETECTIVE CONTROLS:
• Logging and monitoring
• Intrusion detection
• Anomaly detection
• Security scanning
• Audit mechanisms

CORRECTIVE CONTROLS:
• Incident response
• Backup and recovery
• Patch management
• Configuration management
• Business continuity

DETERRENT CONTROLS:
• Security policies
• Legal agreements
• Awareness training
• Physical security
• Compliance monitoring
```

## Attack Tree Analysis

### Example: Web Application Login Bypass
```
Goal: Gain Unauthorized Access to User Account

OR
ā”œā”€ā”€ Credential-based Attacks
│   OR
│   ā”œā”€ā”€ Password Attacks
│   │   OR
│   │   ā”œā”€ā”€ Brute Force (AND)
│   │   │   ā”œā”€ā”€ No account lockout
│   │   │   ā”œā”€ā”€ Weak password policy
│   │   │   └── No rate limiting
│   │   ā”œā”€ā”€ Dictionary Attack (AND)
│   │   │   ā”œā”€ā”€ Common passwords used
│   │   │   └── No complexity requirements
│   │   └── Credential Stuffing (AND)
│   │       ā”œā”€ā”€ Breached credentials available
│   │       └── Users reuse passwords
│   └── Social Engineering (AND)
│       ā”œā”€ā”€ Phishing successful
│       ā”œā”€ā”€ User provides credentials
│       └── No 2FA implemented
│
ā”œā”€ā”€ Technical Vulnerabilities
│   OR
│   ā”œā”€ā”€ SQL Injection (AND)
│   │   ā”œā”€ā”€ Unparameterized queries
│   │   ā”œā”€ā”€ Insufficient input validation
│   │   └── Database errors exposed
│   ā”œā”€ā”€ Session Management (AND)
│   │   ā”œā”€ā”€ Session fixation possible
│   │   ā”œā”€ā”€ Weak session tokens
│   │   └── No session timeout
│   └── Authentication Bypass (AND)
│       ā”œā”€ā”€ Logic flaws in auth code
│       ā”œā”€ā”€ Race conditions
│       └── Parameter tampering
│
└── Infrastructure Attacks
    OR
    ā”œā”€ā”€ Network Interception (AND)
    │   ā”œā”€ā”€ Unencrypted traffic
    │   ā”œā”€ā”€ Man-in-the-middle position
    │   └── Credential capture tools
    └── System Compromise (AND)
        ā”œā”€ā”€ Server vulnerability
        ā”œā”€ā”€ Privilege escalation
        └── Database access
```

## Threat Intelligence Integration

### Threat Actor Profiles
```
NATION-STATE ACTORS:
• Capabilities: Advanced persistent threats
• Motivations: Espionage, infrastructure disruption
• Resources: Significant funding and expertise
• Typical TTPs: Zero-day exploits, supply chain attacks

CYBERCRIMINALS:
• Capabilities: Sophisticated tools and techniques
• Motivations: Financial gain
• Resources: Organized crime networks
• Typical TTPs: Ransomware, banking trojans, fraud

INSIDER THREATS:
• Capabilities: Authorized access and knowledge
• Motivations: Financial, ideological, revenge
• Resources: System access and credentials
• Typical TTPs: Data exfiltration, sabotage

HACKTIVISTS:
• Capabilities: Moderate technical skills
• Motivations: Political or social causes
• Resources: Community support
• Typical TTPs: DDoS, website defacement, leaks

SCRIPT KIDDIES:
• Capabilities: Limited technical skills
• Motivations: Curiosity, recognition
• Resources: Publicly available tools
• Typical TTPs: Automated attacks, known exploits
```

## Output Formats

### Executive Threat Model Summary
```
THREAT MODEL EXECUTIVE SUMMARY

System: [Application/System Name]
Date: [Assessment Date]
Methodology: STRIDE + Attack Trees

RISK SUMMARY:
• Critical Risks: X
• High Risks: Y  
• Medium Risks: Z
• Low Risks: W

TOP THREATS:
1. [Threat Name] - Risk Score: X.X
   Impact: [Business consequence]
   Likelihood: [Probability assessment]
   
2. [Threat Name] - Risk Score: X.X
   Impact: [Business consequence]  
   Likelihood: [Probability assessment]

3. [Threat Name] - Risk Score: X.X
   Impact: [Business consequence]
   Likelihood: [Probability assessment]

RECOMMENDED MITIGATIONS:
1. [Priority 1 Control] - Addresses X threats
2. [Priority 2 Control] - Addresses Y threats  
3. [Priority 3 Control] - Addresses Z threats

RESIDUAL RISK: [Acceptable/Needs Review/Unacceptable]
```

### Technical Threat Analysis
```
THREAT: [Specific Threat Name]
ID: THR-001
STRIDE Category: [S/T/R/I/D/E]

DESCRIPTION:
[Detailed threat scenario description]

AFFECTED ASSETS:
• [Asset 1] - [Impact type]
• [Asset 2] - [Impact type]

THREAT ACTORS:
• [Actor Type] - [Capability Level]
• [Motivation] - [Resource Level]

ATTACK VECTORS:
1. [Vector 1] - [Complexity: Low/Medium/High]
2. [Vector 2] - [Complexity: Low/Medium/High]

PREREQUISITES:
• [Condition 1]
• [Condition 2]

IMPACT ANALYSIS:
• Confidentiality: [High/Medium/Low]
• Integrity: [High/Medium/Low]  
• Availability: [High/Medium/Low]
• Business Impact: [Description]

LIKELIHOOD ASSESSMENT:
• Attack Complexity: [Low/Medium/High]
• Required Skills: [Basic/Intermediate/Advanced]
• Required Access: [None/User/Admin]
• Overall Likelihood: [1-5 scale]

EXISTING CONTROLS:
• [Control 1] - [Effectiveness: High/Medium/Low]
• [Control 2] - [Effectiveness: High/Medium/Low]

RECOMMENDED MITIGATIONS:
1. [Mitigation 1] - [Cost: $X, Effort: Y days]
2. [Mitigation 2] - [Cost: $X, Effort: Y days]

ACCEPTANCE CRITERIA:
[Conditions under which residual risk is acceptable]
```

## Integration Capabilities

### Works Best With:
- **Security Analyst Persona**: Strategic security expertise
- **Penetration Testing Skill**: Validation of identified threats
- **Code Review Skills**: Implementation vulnerability correlation
- **Risk Assessment Templates**: Consistent risk documentation
- **Architecture Documentation**: System understanding

### Tool Integration:
- **Microsoft Threat Modeling Tool**: Visual diagram creation
- **OWASP Threat Dragon**: Web-based threat modeling
- **IriusRisk**: Automated threat identification
- **ThreatModeler**: Enterprise threat modeling platform

## Continuous Threat Modeling

### Iterative Process:
1. **Initial Assessment**: Baseline threat model creation
2. **Regular Reviews**: Quarterly threat landscape updates  
3. **Change Triggers**: Architecture modifications, new threats
4. **Validation Testing**: Penetration testing correlation
5. **Metrics Tracking**: Threat model effectiveness measurement

### Automation Opportunities:
- **Asset Discovery**: Automated inventory updates
- **Threat Intelligence**: Feed integration for new threats
- **Control Validation**: Automated testing of mitigations
- **Risk Scoring**: Dynamic risk calculation updates

Signals

Avg rating⭐ 0.0
Reviews0
Favorites0

Information

Repository
mickdarling/dollhouse-portfolio
Author
mickdarling
Last Sync
1/14/2026
Repo Updated
10/25/2025
Created
1/13/2026

Reviews (0)

No reviews yet. Be the first to review this skill!