threat-modeling-ics

Installation
SKILL.md

Threat Modeling ICS

Instructions for AI security agents reviewing Microsoft Threat Modeling Tool threat-list exports.

[!NOTE] Treat the Microsoft TMT CSV as the primary artifact. Preserve native TMT identifiers, titles, categories, descriptions, priorities, states, and analyst-entered notes. Perform review by appending new columns to the exported dataset rather than rewriting the model into a different structure.

[!NOTE] When a Mermaid diagram is absent, a Microsoft TMT model file (*.tm7) is an acceptable architecture source. Extract system elements, trust boundaries, interfaces, and data flows from the model before reviewing the CSV.

Related skills

More from sentenz/skills

Installs
2
Repository
sentenz/skills
GitHub Stars
1
First Seen
Mar 27, 2026