threat-model-generator

Threat Model Generator

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "threat-model-generator" with this command: npx skills add patricio0312rev/skills/patricio0312rev-skills-threat-model-generator

Threat Model Generator

Systematically identify and mitigate security threats.

STRIDE Methodology

S - Spoofing: Impersonating someone/something T - Tampering: Modifying data or code R - Repudiation: Claiming you didn't do something I - Information Disclosure: Exposing protected information D - Denial of Service: Making system unavailable E - Elevation of Privilege: Gaining unauthorized permissions

Asset Identification

interface Asset { name: string; type: "data" | "service" | "user" | "infrastructure"; sensitivity: "public" | "internal" | "confidential" | "restricted"; criticality: "low" | "medium" | "high" | "critical"; }

const assets: Asset[] = [ { name: "User Credentials (passwords, tokens)", type: "data", sensitivity: "restricted", criticality: "critical", }, { name: "Payment Information (credit cards)", type: "data", sensitivity: "restricted", criticality: "critical", }, { name: "API Service", type: "service", sensitivity: "internal", criticality: "high", }, { name: "User Profile Data", type: "data", sensitivity: "confidential", criticality: "medium", }, ];

Threat Enumeration

interface Threat { id: string; category: "S" | "T" | "R" | "I" | "D" | "E"; description: string; asset: string; attackVector: string; likelihood: "low" | "medium" | "high"; impact: "low" | "medium" | "high" | "critical"; riskScore: number; }

const threats: Threat[] = [ { id: "T-001", category: "S", description: "Attacker impersonates user with stolen credentials", asset: "User Credentials", attackVector: "Phishing, credential stuffing, brute force", likelihood: "high", impact: "critical", riskScore: 9, }, { id: "T-002", category: "T", description: "SQL injection allows data modification", asset: "User Profile Data", attackVector: "Malicious SQL in input fields", likelihood: "medium", impact: "high", riskScore: 7, }, { id: "T-003", category: "I", description: "API exposes sensitive user data without auth", asset: "User Profile Data", attackVector: "Direct API access, IDOR", likelihood: "medium", impact: "high", riskScore: 7, }, { id: "T-004", category: "D", description: "DDoS attack overwhelms API", asset: "API Service", attackVector: "Volumetric attack, application-layer flood", likelihood: "medium", impact: "high", riskScore: 7, }, { id: "T-005", category: "E", description: "Privilege escalation via role manipulation", asset: "User Profile Data", attackVector: "Parameter tampering, insecure direct object reference", likelihood: "low", impact: "critical", riskScore: 6, }, ];

Mitigation Strategies

interface Mitigation { threatId: string; strategy: string; implementation: string; effectiveness: "low" | "medium" | "high"; cost: "low" | "medium" | "high"; priority: 1 | 2 | 3; }

const mitigations: Mitigation[] = [ { threatId: "T-001", strategy: "Multi-factor authentication", implementation: "TOTP via authenticator app + SMS backup", effectiveness: "high", cost: "medium", priority: 1, }, { threatId: "T-001", strategy: "Rate limiting on login attempts", implementation: "Max 5 attempts per 15 minutes per IP", effectiveness: "medium", cost: "low", priority: 1, }, { threatId: "T-002", strategy: "Parameterized queries", implementation: "Use ORM (Prisma) for all database access", effectiveness: "high", cost: "low", priority: 1, }, { threatId: "T-003", strategy: "Authentication & Authorization", implementation: "JWT tokens + RBAC middleware on all routes", effectiveness: "high", cost: "low", priority: 1, }, { threatId: "T-004", strategy: "Rate limiting & CDN", implementation: "CloudFlare with rate limits + WAF rules", effectiveness: "high", cost: "medium", priority: 2, }, { threatId: "T-005", strategy: "Role-based access control", implementation: "Enforce RBAC checks on all mutations", effectiveness: "high", cost: "low", priority: 1, }, ];

Residual Risk Assessment

interface ResidualRisk { threatId: string; originalRisk: number; mitigatedRisk: number; residualRisk: number; acceptanceReason?: string; monitoringRequired: boolean; }

function calculateResidualRisk( threat: Threat, mitigations: Mitigation[] ): ResidualRisk { const threatMitigations = mitigations.filter((m) => m.threatId === threat.id);

// Calculate risk reduction const maxEffectiveness = Math.max( ...threatMitigations.map((m) => { if (m.effectiveness === "high") return 0.8; if (m.effectiveness === "medium") return 0.5; return 0.2; }) );

const mitigatedRisk = threat.riskScore * (1 - maxEffectiveness);

return { threatId: threat.id, originalRisk: threat.riskScore, mitigatedRisk, residualRisk: Math.round(mitigatedRisk), acceptanceReason: mitigatedRisk < 3 ? "Risk reduced to acceptable level" : undefined, monitoringRequired: mitigatedRisk >= 3, }; }

Threat Model Document Template

Threat Model: User Authentication System

Date: 2024-01-15 Owner: Security Team Reviewers: Engineering, Product

1. System Overview

Architecture

  • Frontend: React SPA
  • Backend: Node.js + Express
  • Database: PostgreSQL
  • Auth: JWT tokens

Trust Boundaries

  • Internet → CDN
  • CDN → Backend API
  • Backend API → Database

2. Assets

AssetTypeSensitivityCriticality
User CredentialsDataRestrictedCritical
Session TokensDataRestrictedCritical
User ProfileDataConfidentialMedium

3. Threats (STRIDE)

Spoofing (S)

T-001: Credential Theft

  • Likelihood: High
  • Impact: Critical
  • Risk Score: 9
  • Attack Vector: Phishing, credential stuffing
  • Mitigations:
    • MFA required for all accounts
    • Rate limiting on login (5 attempts/15min)
    • Breach password detection
  • Residual Risk: 3 (Low)

Tampering (T)

T-002: Token Modification

  • Likelihood: Medium
  • Impact: High
  • Risk Score: 7
  • Attack Vector: Token tampering, replay attacks
  • Mitigations:
    • HMAC signature on JWT
    • Short token expiry (15 min)
    • Refresh token rotation
  • Residual Risk: 2 (Low)

Information Disclosure (I)

T-003: Sensitive Data Leakage

  • Likelihood: Medium
  • Impact: High
  • Risk Score: 7
  • Attack Vector: Error messages, logs, API responses
  • Mitigations:
    • Generic error messages
    • PII redaction in logs
    • HTTPS everywhere
  • Residual Risk: 2 (Low)

4. Risk Summary

PriorityThreatsMitigatedResidual Risk
P133Low
P221Medium
P310Medium

5. Recommendations

  1. Immediate (P1)

    • Implement MFA
    • Add rate limiting
    • Deploy PII redaction
  2. Short-term (P2)

    • Add DDoS protection
    • Implement RBAC auditing
  3. Long-term (P3)

    • Security training for team
    • Penetration testing

6. Acceptance

  • Security Team Approval
  • Engineering Lead Approval
  • Product Manager Approval

Automated Threat Detection

// scripts/detect-threats.ts interface CodePattern { pattern: RegExp; threat: string; severity: "low" | "medium" | "high" | "critical"; }

const patterns: CodePattern[] = [ { pattern: /eval(/, threat: "Code injection via eval()", severity: "critical", }, { pattern: /innerHTML\s*=/, threat: "XSS via innerHTML", severity: "high", }, { pattern: /process.env./, threat: "Hardcoded environment variable", severity: "medium", }, { pattern: /password|secret|key/i, threat: "Potential secret in code", severity: "high", }, ];

Best Practices

  • Regular updates: Quarterly threat model reviews

  • Include stakeholders: Security, Engineering, Product

  • Document decisions: Why threats accepted/mitigated

  • Test mitigations: Verify controls work

  • Monitor residual risks: Track over time

  • Automate where possible: Integrate into CI/CD

Output Checklist

  • Assets identified and classified

  • Threats enumerated using STRIDE

  • Attack vectors documented

  • Mitigations defined for each threat

  • Residual risk calculated

  • Risk acceptance documented

  • Monitoring plan created

  • Threat model document generated

  • Stakeholder approval obtained

  • Review schedule set

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

auth-security-reviewer

No summary provided by upstream source.

Repository SourceNeeds Review
Security

accessibility-auditor

No summary provided by upstream source.

Repository SourceNeeds Review
Security

data-integrity-auditor

No summary provided by upstream source.

Repository SourceNeeds Review
Security

api-security-hardener

No summary provided by upstream source.

Repository SourceNeeds Review