home / skills / sickn33 / antigravity-awesome-skills / security-requirement-extraction
This skill translates threat analysis into actionable security requirements, enabling security user stories, tests, and architecture documentation.
npx playbooks add skill sickn33/antigravity-awesome-skills --skill security-requirement-extractionReview the files below or copy the command above to add this skill to your agents.
---
name: security-requirement-extraction
description: Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.
---
# Security Requirement Extraction
Transform threat analysis into actionable security requirements.
## Use this skill when
- Converting threat models to requirements
- Writing security user stories
- Creating security test cases
- Building security acceptance criteria
- Compliance requirement mapping
- Security architecture documentation
## Do not use this skill when
- The task is unrelated to security requirement extraction
- You need a different domain or tool outside this scope
## Instructions
- Clarify goals, constraints, and required inputs.
- Apply relevant best practices and validate outcomes.
- Provide actionable steps and verification.
- If detailed examples are required, open `resources/implementation-playbook.md`.
## Resources
- `resources/implementation-playbook.md` for detailed patterns and examples.
This skill extracts actionable security requirements from threat models and business context. It turns identified threats, assets, and constraints into measurable requirements, acceptance criteria, and testable user stories. The output is designed for engineers, product owners, and security teams to implement and verify controls.
Provide the threat model, business objectives, assets, and constraints. The skill maps threat scenarios to control goals, derives measurable requirements (what to implement), and creates verification steps and test cases. It applies security best practices and compliance mappings where relevant, and can output user stories, acceptance criteria, and testable items.
What inputs are required to produce high-quality requirements?
A clear threat model, asset list, business objectives, constraints (technical, legal), and any applicable compliance standards yield the best results.
How are requirements validated?
Each requirement includes acceptance criteria and verification steps; validation is achieved through tests, code review checklists, and evidence linked to the requirement.