T

Skill Entry

Threat modeling

Walks data flows and trust boundaries before you ship: who can call what, which secrets move where, and which failures become customer-visible—so security reviews start with diagrams instead of last-minute checklist panic.

Category Research
Platform Codex / Claude Code
Published 2026-04-11
securityarchitecturerisk

Use cases

  • New service launch
  • Agent tool access
  • Compliance prep

Key features

  • Draw actors, data stores, and trust zones
  • List top misuse cases
  • Prioritize mitigations with owners

Related

Related

3 Indexed items