Skip to content

Code-First Deep Risk Analysis Skill for Claude Code - 8-Phase Workflow with Security design review, STRIDE Threat modeling, PenTest and attack chain analysis, Software compliance assessment

License

Notifications You must be signed in to change notification settings

HACK-THE-WORLD/skill-threat-modeling

 
 

Repository files navigation

Code-First Deep Risk Analysis Skill

Code-First Automated Threat Modeling Toolkit | Version 2.1.1

8-Phase Serial Workflow · Dual Knowledge Base Architecture · STRIDE+CWE+CAPEC+ATT&CK Full Chain Mapping

Installation · Quick Start · Documentation · 中文版


Overview

A comprehensive Code-First threat modeling toolkit for Claude Code that transforms source code analysis into actionable security insights through an 8-phase serial workflow.

Key Features

Feature Description
8-Phase Serial Workflow Strict sequential execution ensuring maximum depth and complete coverage
Dual Knowledge Base Core DB (969 CWE, 615 CAPEC) + CVE Extension (323K+ CVE)
Full Chain Mapping STRIDE → CWE → CAPEC → ATT&CK → CVE/KEV intelligence chain
Security Design & Control 11 security principles + 16 security domains assessment with control mapping
Attack Path Validation CAPEC + ATT&CK attack chain mapping with POC design
KB-Enhanced Mitigations Context-aware mitigation suggestions per threat
AI/LLM Extensions OWASP LLM Top 10 + AI component threat coverage
Agent Skill Prompt Assessment OWASP Agentic Top 10 (ASI01-ASI10) + Least Agency principle evaluation

Workflow Overview

Phase 1 ──► Phase 2 ──► Phase 3 ──► Phase 4 ──► Phase 5 ──► Phase 6 ──► Phase 7 ──► Phase 8
Project     Call Flow    Trust      Security    STRIDE      Risk        Mitigation   Report
Understanding  DFD      Boundaries   Design     Analysis   Validation

Installation

Multi-Platform Support

This skill supports multiple AI agent platforms:

┌─────────────────────────────────────────────────────────────────────────────┐
│                        Supported Agent Platforms                             │
├─────────────────────────────────────────────────────────────────────────────┤
│  Platform        │  Global Path                    │  Project-Local Path    │
├──────────────────┼─────────────────────────────────┼────────────────────────┤
│  Claude Code     │  ~/.claude/skills/              │  .claude/skills/       │
│  OpenAI Codex    │  ~/.codex/skills/               │  .codex/skills/        │
│  GitHub Copilot  │  (uses .github/skills/)         │  .github/skills/       │
│  Qwen Code       │  ~/.qwen/agents/                │  .qwen/agents/         │
│  Goose           │  ~/.config/goose/skills/        │  .goose/skills/        │
│  Portable (XDG)  │  ~/.config/agents/skills/       │  .agents/skills/       │
└─────────────────────────────────────────────────────────────────────────────┘

Installation Options

┌─────────────────────────────────────────────────────────────┐
│                 How to Choose Installation?                  │
├─────────────────────────────────────────────────────────────┤
│                                                              │
│  Personal use, share across projects  ──────►  Global       │
│                                        ~/.claude/skills/     │
│                                                              │
│  Team collaboration, version control  ──────►  Project-local│
│                                        project/.claude/skills│
│                                                              │
│  Cross-platform / portable            ──────►  XDG Standard │
│                                        ~/.config/agents/skills│
│                                                              │
└─────────────────────────────────────────────────────────────┘

System Requirements

Python 3.8+  |  PyYAML >= 6.0

Option 1: Global Installation (Available to All Projects)

# Clone from GitHub (directory will be named "skill-threat-modeling")
git clone https://github.com/fr33d3m0n/skill-threat-modeling.git

# Copy to Claude Code global skills directory (rename to "threat-modeling")
cp -r skill-threat-modeling ~/.claude/skills/threat-modeling

# Or keep the original name (both work!)
cp -r skill-threat-modeling ~/.claude/skills/skill-threat-modeling

# Install dependencies
pip install pyyaml

Option 2: Project-Local Installation (Current Project Only)

# Create .claude/skills directory in project root
mkdir -p /path/to/your-project/.claude/skills

# Copy skill to project local
cp -r skill-threat-modeling /path/to/your-project/.claude/skills/threat-modeling

# Install dependencies
pip install pyyaml

Option 3: Environment Variable (Explicit Path)

# Set SKILL_PATH to skill location (works with any directory name)
export SKILL_PATH=/path/to/skill-threat-modeling

# Scripts will auto-detect via environment variable
python "$SKILL_PATH/scripts/unified_kb_query.py" --stride spoofing

Installation Comparison:

Method Path Scope Directory Name
Global ~/.claude/skills/ All projects threat-modeling or skill-threat-modeling
Project-local project/.claude/skills/ Current project only threat-modeling or skill-threat-modeling
XDG Portable ~/.config/agents/skills/ Cross-platform Any
Environment $SKILL_PATH Explicit override Any

Recommendation: For team-shared security assessment projects, use project-local installation so the skill can be version controlled with project code.

Verify Installation

python scripts/unified_kb_query.py --all-stride --pretty

Directory Structure

threat-modeling/
├── SKILL.md                  # ← Claude Code entry point (8-phase workflow)
├── WORKFLOW.md               # Detailed workflow templates
├── VALIDATION.md             # Validation rules and quality gates
├── REPORT.md                 # Report generation templates
├── README.md / README-cn.md  # Documentation (EN/CN)
├── EXAMPLES.md / EXAMPLES-cn.md  # Usage examples
├── VERSION                   # Version number
├── LICENSE                   # BSD-3-Clause license
├── scripts/                  # Tool scripts
│   ├── list_files.py             # Phase 1: Project structure analysis
│   ├── stride_matrix.py          # Phase 5: STRIDE matrix
│   ├── unified_kb_query.py       # Phase 5/6/7: Unified KB query
│   ├── collect_code_stats.py     # Code statistics collection
│   └── validate_count_conservation.py  # Validation utility
├── assets/
│   ├── knowledge/            # Dual database knowledge system
│   │   ├── security_kb.sqlite    # Core DB (18MB)
│   │   ├── security-*.yaml       # Security rules and mappings
│   │   ├── security-controls/    # 16 security domain controls
│   │   └── semantic_index/       # Semantic search index
│   ├── schemas/              # Output schema definitions
│   └── templates/            # Report templates
├── references/               # Architecture documentation
│   ├── SKILL-ARCHITECTURE-DESIGN.md      # System architecture
│   ├── ARCHITECTURE-WORKFLOW-GUIDE.md    # Workflow guide
│   └── KNOWLEDGE-ARCHITECTURE-v5.2.md    # Knowledge base architecture
├── kb                        # Knowledge base symlink
└── skill_path.sh             # Path detection helper

Quick Start

Using in Claude Code

Auto-Activation

The skill automatically activates when you mention these keywords:

English Chinese
threat model 威胁建模
security assessment 安全评估
security check 安全检查
DFD / data flow diagram 数据流图
trust boundary 信任边界
attack surface 攻击面
STRIDE analysis STRIDE 分析

Usage Examples

Threat Modeling

User: Help me threat model @/path/to/project

Claude: [Auto-activates skill]
        Phase 1: Analyzing project structure...
        Phase 2: Building DFD...
        Phase 5: STRIDE analysis...

        ## Threat List
        | ID | Category | Description | Priority |
        | T-S-P1-001 | Spoofing | API lacks authentication | Critical |
        ...

Quick Security Check

User: Quick security check on this service @/path/to/service

Claude: Found 3 high-severity threats:
        - T-S-P1-001: API endpoint lacks authentication
        - T-E-P2-001: Delete endpoint missing authorization
        - T-I-DF1-001: Sensitive data transmitted in plaintext

AI/LLM Applications

User: Analyze security risks for this RAG app @/path/to/rag-app

Claude: [Enables OWASP LLM Top 10 extension]
        - LLM01: Prompt Injection risk
        - LLM06: Sensitive information disclosure risk
        ...

Manual Script Execution

# Project structure analysis (Phase 1)
python scripts/list_files.py ./project --categorize --detect-type --pretty

# Knowledge base queries (Phase 5/6/7)
python scripts/unified_kb_query.py --full-chain CWE-89
python scripts/unified_kb_query.py --capec CAPEC-66 --attack-chain
python scripts/unified_kb_query.py --attack-technique T1059
python scripts/unified_kb_query.py --cwe CWE-89 --mitigations
python scripts/unified_kb_query.py --all-llm

Core Capabilities

8-Phase Workflow Outputs

Phase Output
1-4 Project overview, DFD diagram, key interfaces/boundaries/data nodes, security design matrix
5 Threat list (STRIDE+CWE+ATT&CK+LLM)
6 Validation methods (attack paths + POC)
7 Mitigations (remediation suggestions per threat)
8 {PROJECT}-RISK-ASSESSMENT-REPORT.md comprehensive report

Capability Matrix

Capability Description
8-Phase Serial Workflow Strict sequential execution with phase output chaining
DFD Construction Mermaid templates + element inventory + trust boundaries
STRIDE Matrix TMT-compatible STRIDE per Interaction
Threat ID Standard format T-{STRIDE}-{Element}-{Seq}
Dual Database KB Core DB (969 CWE, 615 CAPEC) + CVE extension (323K+ CVE)
Attack Path Validation CAPEC + ATT&CK attack chain mapping + POC design
KB-Enhanced Mitigations Query knowledge base to generate customized mitigations per threat

Scenario Extensions

Extension Coverage
Cloud Services AWS / Azure / GCP / Alibaba Cloud / Tencent Cloud
AI/LLM OWASP LLM Top 10 + AI component threats
CVE Validation 323K+ CVE + KEV (Known Exploited Vulnerabilities) checks
Agent/Skill Prompt OWASP Agentic Security Top 10 + Least Agency principle

Agent & Skill Prompt Security Assessment

Specialized security assessment for AI Agent systems and Claude Code Skills:

Assessment Area Coverage
OWASP Agentic Top 10 ASI01-ASI10 vulnerability categories for autonomous AI agents
Least Agency Principle Minimal permission & capability scoping evaluation
Tool Call Security MCP server integration, command injection, path traversal
Prompt Injection Defense Direct/indirect injection, jailbreak resistance analysis
Data Boundary Control Sensitive data exposure, context leakage prevention
Autonomy Risk Assessment Decision boundary, human oversight, action reversibility

Documentation

Document Content
SKILL.md Claude Code skill entry point (8-phase workflow overview)
WORKFLOW.md Detailed 8-phase deep workflow templates
README.md Quick start guide, installation, usage examples
EXAMPLES.md 5 real-world cases (REST API, microservices, AI/LLM, cloud-native)

Architecture Documentation

Document Content
references/SKILL-ARCHITECTURE-DESIGN.md System architecture and design principles
references/ARCHITECTURE-WORKFLOW-GUIDE.md Complete architecture and workflow guide
references/KNOWLEDGE-ARCHITECTURE-v5.2.md Knowledge base architecture (Dual System A+B)

Knowledge Architecture

Dual Knowledge System

┌─────────────────────────────────────────────────────────────────────────────┐
│                         Dual Knowledge Architecture                          │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│  System A: Security Control Hierarchy        System B: Threat Intelligence  │
│  ─────────────────────────────────           ─────────────────────────────  │
│  L1: Security Principles (11) +              L1: STRIDE Classification      │
│      Security Domains (16)                   L2: CWE+CAPEC+ATT&CK Mapping   │
│  L2: Control Sets + OWASP References         L3: CVE Vulnerability Database │
│  L3: Compliance Frameworks                   L4: KEV Real-time Intelligence │
│                                                                              │
│  Verification Set: WSTG(121) + MASTG(206) + ASVS(345) = 672 Tests          │
│  → Mapped to 1,269 STRIDE+Test combinations                                 │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Threat Intelligence Chain

STRIDE → CWE → CAPEC → ATT&CK → CVE/KEV
  L1      ├────── L2 ──────┤    L3 + L4

L1 STRIDE → L2 Threat Intelligence:
───────────────────────────────────────────────────────────────────────────────
S(Spoofing)      → CWE-287/290/307 → CAPEC-151/194/600 → T1078/T1110 → CVE-*
T(Tampering)     → CWE-20/77/89    → CAPEC-66/88/248   → T1190/T1059 → CVE-*
R(Repudiation)   → CWE-117/223/778 → CAPEC-93/268      → T1070/T1562 → CVE-*
I(Info Disclosure)→ CWE-200/209/311 → CAPEC-116/157/497 → T1552/T1213 → CVE-*
D(Denial of Svc) → CWE-400/770/918 → CAPEC-125/227/469 → T1498/T1499 → CVE-*
E(Elev. of Priv) → CWE-269/284/862 → CAPEC-122/233/17  → T1068/T1548 → CVE-*

Version History

v2.1.0 (Current)

  • STRIDE→Test Mapping Expansion: 162 → 1,269 test mappings
  • Verification Set Integration: WSTG(121) + MASTG(206) + ASVS(345)
  • L1 STRIDE Layer: Complete threat intelligence chain documentation
  • Dual Knowledge Architecture: System A (Controls) + System B (Threats)
  • Bilingual Documentation: Full English + Chinese documentation

Version 2.1.1 | 中文版

About

Code-First Deep Risk Analysis Skill for Claude Code - 8-Phase Workflow with Security design review, STRIDE Threat modeling, PenTest and attack chain analysis, Software compliance assessment

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 97.3%
  • Shell 2.7%