General
Threat Modeling - Claude MCP Skill
Systematic approach to identifying, analyzing, and mitigating security threats in systems and applications
SEO Guide: Enhance your AI agent with the Threat Modeling tool. This Model Context Protocol (MCP) server allows Claude Desktop and other LLMs to systematic approach to identifying, analyzing, and mitigating security threats in systems and applic... Download and configure this skill to unlock new capabilities for your AI workflow.
Documentation
SKILL.md# Threat Modeling Skill
This skill provides systematic threat modeling capabilities using industry-standard methodologies to identify, analyze, and prioritize security threats in complex systems.
## Core Capabilities
### 1. Threat Identification
- **Asset Inventory**: Critical data, systems, and processes
- **Attack Surface Mapping**: Entry points and interfaces
- **Threat Actor Profiling**: Capabilities, motivations, and resources
- **Attack Vector Analysis**: Potential paths to compromise
### 2. Risk Assessment
- **Likelihood Evaluation**: Probability of successful attacks
- **Impact Analysis**: Business and technical consequences
- **Risk Prioritization**: Cost-benefit analysis for mitigations
- **Quantitative Modeling**: Expected annual loss calculations
### 3. Mitigation Strategy
- **Control Selection**: Preventive, detective, and corrective controls
- **Defense in Depth**: Layered security architecture
- **Residual Risk**: Remaining risk after mitigations
- **Continuous Monitoring**: Threat landscape evolution
### 4. Documentation & Communication
- **Threat Models**: Visual representations and narratives
- **Risk Registers**: Centralized risk tracking
- **Security Requirements**: Derived from threat analysis
- **Executive Reporting**: Business-focused risk communication
## Threat Modeling Methodologies
### STRIDE Framework
```
SPOOFING
āāā Identity spoofing attacks
āāā Authentication bypass
āāā Impersonation threats
āāā Credential theft scenarios
TAMPERING
āāā Data integrity attacks
āāā Man-in-the-middle
āāā Code injection
āāā Configuration manipulation
REPUDIATION
āāā Non-repudiation failures
āāā Log tampering
āāā Audit trail gaps
āāā Transaction disputes
INFORMATION DISCLOSURE
āāā Data exposure
āāā Privacy violations
āāā Information leakage
āāā Unauthorized access
DENIAL OF SERVICE
āāā Resource exhaustion
āāā Service disruption
āāā Availability attacks
āāā Performance degradation
ELEVATION OF PRIVILEGE
āāā Privilege escalation
āāā Authorization bypass
āāā Administrative access
āāā System compromise
```
### PASTA (Process for Attack Simulation and Threat Analysis)
```
Stage 1: Define Objectives
⢠Business impact analysis
⢠Compliance requirements
⢠Security objectives
⢠Success criteria
Stage 2: Define Technical Scope
⢠Application architecture
⢠Technology stack
⢠Network topology
⢠Data flows
Stage 3: Application Decomposition
⢠Use cases and user roles
⢠Entry and exit points
⢠Trust boundaries
⢠Dependencies
Stage 4: Threat Analysis
⢠Attack scenarios
⢠Threat agent capabilities
⢠Attack vectors
⢠Vulnerability correlation
Stage 5: Weakness Analysis
⢠Design flaws
⢠Implementation bugs
⢠Configuration errors
⢠Process weaknesses
Stage 6: Attack Modeling
⢠Attack trees
⢠Kill chains
⢠Attack scenarios
⢠Exploitation paths
Stage 7: Risk Analysis
⢠Business impact
⢠Technical impact
⢠Likelihood assessment
⢠Risk scoring
```
## Threat Modeling Process
### Phase 1: System Understanding
```
Architecture Analysis:
⢠System boundaries and scope
⢠Data flow diagrams (DFDs)
⢠Trust boundaries identification
⢠External dependencies mapping
Components Inventory:
⢠Web servers and applications
⢠Databases and data stores
⢠Network infrastructure
⢠Third-party services
⢠Human processes
Data Classification:
⢠Sensitive data identification
⢠Data flow mapping
⢠Storage locations
⢠Processing activities
⢠Retention requirements
```
### Phase 2: Threat Identification
```
Threat Enumeration:
Using STRIDE per element:
Process Threats:
āāā Spoofing: Fake service instances
āāā Tampering: Code injection attacks
āāā Repudiation: Log manipulation
āāā Information Disclosure: Memory dumps
āāā Denial of Service: Resource exhaustion
āāā Elevation of Privilege: Buffer overflows
Data Store Threats:
āāā Spoofing: Rogue databases
āāā Tampering: Direct DB access
āāā Repudiation: Audit trail gaps
āāā Information Disclosure: Data dumps
āāā Denial of Service: Storage exhaustion
āāā Elevation of Privilege: DB admin access
Data Flow Threats:
āāā Spoofing: Man-in-the-middle
āāā Tampering: Packet modification
āāā Repudiation: Message alteration
āāā Information Disclosure: Eavesdropping
āāā Denial of Service: Connection flooding
āāā Elevation of Privilege: Protocol exploits
```
### Phase 3: Risk Analysis
```
Likelihood Assessment:
⢠Threat actor capabilities
⢠Attack complexity
⢠Required resources
⢠Detection probability
⢠Success rate
Impact Assessment:
⢠Confidentiality impact
⢠Integrity impact
⢠Availability impact
⢠Business disruption
⢠Regulatory violations
⢠Reputation damage
Risk Calculation:
Risk = Likelihood Ć Impact Ć Vulnerability
Where:
⢠Likelihood: 1-5 scale (Very Low to Very High)
⢠Impact: 1-5 scale (Minimal to Catastrophic)
⢠Vulnerability: 0.1-1.0 (Well Protected to Exposed)
```
### Phase 4: Mitigation Planning
```
Control Categories:
PREVENTIVE CONTROLS:
⢠Input validation
⢠Authentication mechanisms
⢠Authorization checks
⢠Encryption implementation
⢠Network segmentation
DETECTIVE CONTROLS:
⢠Logging and monitoring
⢠Intrusion detection
⢠Anomaly detection
⢠Security scanning
⢠Audit mechanisms
CORRECTIVE CONTROLS:
⢠Incident response
⢠Backup and recovery
⢠Patch management
⢠Configuration management
⢠Business continuity
DETERRENT CONTROLS:
⢠Security policies
⢠Legal agreements
⢠Awareness training
⢠Physical security
⢠Compliance monitoring
```
## Attack Tree Analysis
### Example: Web Application Login Bypass
```
Goal: Gain Unauthorized Access to User Account
OR
āāā Credential-based Attacks
ā OR
ā āāā Password Attacks
ā ā OR
ā ā āāā Brute Force (AND)
ā ā ā āāā No account lockout
ā ā ā āāā Weak password policy
ā ā ā āāā No rate limiting
ā ā āāā Dictionary Attack (AND)
ā ā ā āāā Common passwords used
ā ā ā āāā No complexity requirements
ā ā āāā Credential Stuffing (AND)
ā ā āāā Breached credentials available
ā ā āāā Users reuse passwords
ā āāā Social Engineering (AND)
ā āāā Phishing successful
ā āāā User provides credentials
ā āāā No 2FA implemented
ā
āāā Technical Vulnerabilities
ā OR
ā āāā SQL Injection (AND)
ā ā āāā Unparameterized queries
ā ā āāā Insufficient input validation
ā ā āāā Database errors exposed
ā āāā Session Management (AND)
ā ā āāā Session fixation possible
ā ā āāā Weak session tokens
ā ā āāā No session timeout
ā āāā Authentication Bypass (AND)
ā āāā Logic flaws in auth code
ā āāā Race conditions
ā āāā Parameter tampering
ā
āāā Infrastructure Attacks
OR
āāā Network Interception (AND)
ā āāā Unencrypted traffic
ā āāā Man-in-the-middle position
ā āāā Credential capture tools
āāā System Compromise (AND)
āāā Server vulnerability
āāā Privilege escalation
āāā Database access
```
## Threat Intelligence Integration
### Threat Actor Profiles
```
NATION-STATE ACTORS:
⢠Capabilities: Advanced persistent threats
⢠Motivations: Espionage, infrastructure disruption
⢠Resources: Significant funding and expertise
⢠Typical TTPs: Zero-day exploits, supply chain attacks
CYBERCRIMINALS:
⢠Capabilities: Sophisticated tools and techniques
⢠Motivations: Financial gain
⢠Resources: Organized crime networks
⢠Typical TTPs: Ransomware, banking trojans, fraud
INSIDER THREATS:
⢠Capabilities: Authorized access and knowledge
⢠Motivations: Financial, ideological, revenge
⢠Resources: System access and credentials
⢠Typical TTPs: Data exfiltration, sabotage
HACKTIVISTS:
⢠Capabilities: Moderate technical skills
⢠Motivations: Political or social causes
⢠Resources: Community support
⢠Typical TTPs: DDoS, website defacement, leaks
SCRIPT KIDDIES:
⢠Capabilities: Limited technical skills
⢠Motivations: Curiosity, recognition
⢠Resources: Publicly available tools
⢠Typical TTPs: Automated attacks, known exploits
```
## Output Formats
### Executive Threat Model Summary
```
THREAT MODEL EXECUTIVE SUMMARY
System: [Application/System Name]
Date: [Assessment Date]
Methodology: STRIDE + Attack Trees
RISK SUMMARY:
⢠Critical Risks: X
⢠High Risks: Y
⢠Medium Risks: Z
⢠Low Risks: W
TOP THREATS:
1. [Threat Name] - Risk Score: X.X
Impact: [Business consequence]
Likelihood: [Probability assessment]
2. [Threat Name] - Risk Score: X.X
Impact: [Business consequence]
Likelihood: [Probability assessment]
3. [Threat Name] - Risk Score: X.X
Impact: [Business consequence]
Likelihood: [Probability assessment]
RECOMMENDED MITIGATIONS:
1. [Priority 1 Control] - Addresses X threats
2. [Priority 2 Control] - Addresses Y threats
3. [Priority 3 Control] - Addresses Z threats
RESIDUAL RISK: [Acceptable/Needs Review/Unacceptable]
```
### Technical Threat Analysis
```
THREAT: [Specific Threat Name]
ID: THR-001
STRIDE Category: [S/T/R/I/D/E]
DESCRIPTION:
[Detailed threat scenario description]
AFFECTED ASSETS:
⢠[Asset 1] - [Impact type]
⢠[Asset 2] - [Impact type]
THREAT ACTORS:
⢠[Actor Type] - [Capability Level]
⢠[Motivation] - [Resource Level]
ATTACK VECTORS:
1. [Vector 1] - [Complexity: Low/Medium/High]
2. [Vector 2] - [Complexity: Low/Medium/High]
PREREQUISITES:
⢠[Condition 1]
⢠[Condition 2]
IMPACT ANALYSIS:
⢠Confidentiality: [High/Medium/Low]
⢠Integrity: [High/Medium/Low]
⢠Availability: [High/Medium/Low]
⢠Business Impact: [Description]
LIKELIHOOD ASSESSMENT:
⢠Attack Complexity: [Low/Medium/High]
⢠Required Skills: [Basic/Intermediate/Advanced]
⢠Required Access: [None/User/Admin]
⢠Overall Likelihood: [1-5 scale]
EXISTING CONTROLS:
⢠[Control 1] - [Effectiveness: High/Medium/Low]
⢠[Control 2] - [Effectiveness: High/Medium/Low]
RECOMMENDED MITIGATIONS:
1. [Mitigation 1] - [Cost: $X, Effort: Y days]
2. [Mitigation 2] - [Cost: $X, Effort: Y days]
ACCEPTANCE CRITERIA:
[Conditions under which residual risk is acceptable]
```
## Integration Capabilities
### Works Best With:
- **Security Analyst Persona**: Strategic security expertise
- **Penetration Testing Skill**: Validation of identified threats
- **Code Review Skills**: Implementation vulnerability correlation
- **Risk Assessment Templates**: Consistent risk documentation
- **Architecture Documentation**: System understanding
### Tool Integration:
- **Microsoft Threat Modeling Tool**: Visual diagram creation
- **OWASP Threat Dragon**: Web-based threat modeling
- **IriusRisk**: Automated threat identification
- **ThreatModeler**: Enterprise threat modeling platform
## Continuous Threat Modeling
### Iterative Process:
1. **Initial Assessment**: Baseline threat model creation
2. **Regular Reviews**: Quarterly threat landscape updates
3. **Change Triggers**: Architecture modifications, new threats
4. **Validation Testing**: Penetration testing correlation
5. **Metrics Tracking**: Threat model effectiveness measurement
### Automation Opportunities:
- **Asset Discovery**: Automated inventory updates
- **Threat Intelligence**: Feed integration for new threats
- **Control Validation**: Automated testing of mitigations
- **Risk Scoring**: Dynamic risk calculation updatesSignals
Information
- Repository
- mickdarling/dollhouse-portfolio
- Author
- mickdarling
- Last Sync
- 1/14/2026
- Repo Updated
- 10/25/2025
- Created
- 1/13/2026
Reviews (0)
No reviews yet. Be the first to review this skill!
Related Skills
upgrade-nodejs
Upgrading Bun's Self-Reported Node.js Version
cursorrules
CrewAI Development Rules
cn-check
Install and run the Continue CLI (`cn`) to execute AI agent checks on local code changes. Use when asked to "run checks", "lint with AI", "review my changes with cn", or set up Continue CI locally.
CLAUDE
CLAUDE.md
Related Guides
Mastering the Oracle CLI: A Complete Guide to the Claude Skill for Database Professionals
Learn how to use the oracle Claude skill. Complete guide with installation instructions and examples.
Python Django Best Practices: A Comprehensive Guide to the Claude Skill
Learn how to use the python django best practices Claude skill. Complete guide with installation instructions and examples.
Optimize Rell Blockchain Code: A Comprehensive Guide to the Claude Skill
Learn how to use the optimize rell blockchain code Claude skill. Complete guide with installation instructions and examples.