Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Provide structured threat modeling using STRIDE, attack trees, and risk scoring to identify, prioritize, and mitigate security threats in system designs and...
Provide structured threat modeling using STRIDE, attack trees, and risk scoring to identify, prioritize, and mitigate security threats in system designs and...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Expert in threat modeling methodologies, security architecture review, and risk assessment using STRIDE, PASTA, attack trees, and security requirement extraction.
USE WHEN: Designing new systems or features (secure-by-design) Reviewing architecture for security gaps Preparing for security audits Identifying attack vectors and threat actors Prioritizing security investments Creating security documentation Training teams on security thinking DON'T USE WHEN: Lack scope or authorization for security review Need legal compliance certification (consult legal) Only need automated scanning (use vulnerability-scanner)
System boundaries Assets to protect Trust boundaries Regulatory requirements
[User] β [Web App] β [API Gateway] β [Backend] β [Database] β [External API]
Assets: User data, credentials, business logic, infrastructure Entry Points: APIs, forms, file uploads, admin panels
Spoofing: Can someone impersonate? Tampering: Can data be modified? Repudiation: Can actions be denied? Information Disclosure: Can data leak? Denial of Service: Can availability be affected? Elevation of Privilege: Can access be escalated?
Goal: Access Admin Panel βββ Steal admin credentials β βββ Phishing β βββ Brute force β βββ Session hijacking βββ Exploit vulnerability β βββ SQL injection β βββ Auth bypass βββ Social engineering βββ Support desk compromise
Use DREAD or CVSS: Damage potential Reproducibility Exploitability Affected users Discoverability
Map threats to controls and validate coverage.
What's accepted vs. mitigated.
ComponentSpoofingTamperingRepudiationInfo DisclosureDoSEoPWeb AppAuth bypassXSS, CSRFMissing logsError messagesRate limitBroken accessAPIToken theftInput manipNo auditData exposureResource exhaustPrivilege escalationDatabaseCredential theftSQL injectionNo audit trailBackup exposureConnection floodDirect access
Injection (SQL, XSS, command) Broken authentication Sensitive data exposure Broken access control Security misconfiguration Using vulnerable components
Man-in-the-middle Eavesdropping Replay attacks DNS spoofing DDoS
Unauthorized access Misconfigured services Unpatched systems Weak credentials Exposed admin interfaces
Phishing Social engineering Insider threats Credential sharing
ElementSymbolDescriptionExternal EntityRectangleUsers, external systemsProcessCircleApplication logicData StoreParallel linesDatabase, cache, filesData FlowArrowData movementTrust BoundaryDashed lineSecurity perimeter
LOW IMPACT HIGH IMPACT HIGH LIKELIHOOD MEDIUM HIGH LOW LIKELIHOOD LOW MEDIUM
FactorQuestionDamageHow bad if exploited?ReproducibilityHow easy to reproduce?ExploitabilityHow easy to attack?Affected UsersHow many impacted?DiscoverabilityHow easy to find? Score: Sum / 5 = Risk Level
Whitelist validation Parameterized queries Output encoding Content-Type enforcement
MFA where possible Strong password policies Account lockout Secure session management
Principle of least privilege Role-based access control Resource ownership checks Regular permission audits
TLS 1.2+ everywhere Strong key management Secure password hashing Encrypted data at rest
Security event logging Anomaly detection Alert thresholds Incident response plan
Involve developers in threat modeling sessions Focus on data flows, not just components Consider insider threats Update models with architecture changes Link threats to security requirements Track mitigations to implementation Review regularly, not just at design time Keep models living documents
Agent frameworks, memory systems, reasoning layers, and model-native orchestration.
Largest current source with strong distribution and engagement signals.