threat-modelingProvide structured threat modeling using STRIDE, attack trees, and risk scoring to identify, prioritize, and mitigate security threats in system designs and...
Install via ClawdBot CLI:
clawdbot install brandonwise/threat-modelingGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Generated Mar 20, 2026
Analyze a new payment processing system for an online retailer to identify threats like payment data theft, account takeover, and DDoS attacks. Use STRIDE to assess components like checkout APIs and user databases, prioritizing risks with DREAD to secure customer transactions.
Review a mobile health application handling patient records and telemedicine features for compliance with HIPAA. Identify threats such as data leaks, unauthorized access, and tampering via attack trees, focusing on data flows between app servers and external APIs.
Model threats for a smart home system with connected devices like cameras and sensors. Assess spoofing, tampering, and denial-of-service risks across network and infrastructure layers, using data flow diagrams to map trust boundaries and entry points.
Conduct a threat modeling session for a fintech startup integrating third-party banking APIs. Evaluate STRIDE categories on APIs and backend services to prevent fraud, data exposure, and privilege escalation, scoring risks to prioritize security investments.
Assess security gaps when migrating an enterprise application to a cloud provider. Identify threats in application, network, and human layers, such as misconfigured services and insider risks, using mitigation strategies like input validation and monitoring.
Offer threat modeling as a recurring service for ongoing security reviews, helping clients maintain secure-by-design systems. Revenue comes from monthly or annual subscriptions based on usage tiers and support levels.
Provide one-time threat modeling engagements for specific projects like new feature launches or compliance audits. Revenue is generated through fixed project fees or hourly rates tailored to client scope.
Deliver training sessions to development teams on threat modeling methodologies and best practices. Revenue streams include workshop fees, certification programs, and custom training materials for organizations.
💬 Integration Tip
Integrate this skill into CI/CD pipelines by automating threat model updates with architecture changes and linking findings to ticketing systems for mitigation tracking.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.