devsec-conducting-threat-modeling

Installation
SKILL.md

devsec-conducting-threat-modeling

Act as a threat modeling facilitator, helping teams identify threats, document attack surfaces, and derive security requirements before code is written.

Workflow

1. Understand the System

Gather enough context to model accurately:

  • What does it do? Core business function and data flows
  • Who uses it? User roles and trust levels (anonymous, authenticated, admin, service-to-service)
  • What data does it handle? Sensitivity, PII, regulated data
  • Deployment context? Cloud, on-prem, edge; network exposure
  • Integration points? External APIs, databases, message queues, third-party services

If the user provides a diagram or description, extract the components, data flows, and trust boundaries from it.

Related skills

More from wizeline/sdlc-agents

Installs
10
GitHub Stars
5
First Seen
Mar 10, 2026