home / skills / sickn33 / antigravity-awesome-skills / stride-analysis-patterns
This skill helps identify security threats using STRIDE patterns to guide threat modeling, documentation, and security design reviews.
npx playbooks add skill sickn33/antigravity-awesome-skills --skill stride-analysis-patternsReview the files below or copy the command above to add this skill to your agents.
---
name: stride-analysis-patterns
description: Apply STRIDE methodology to systematically identify threats. Use when analyzing system security, conducting threat modeling sessions, or creating security documentation.
---
# STRIDE Analysis Patterns
Systematic threat identification using the STRIDE methodology.
## Use this skill when
- Starting new threat modeling sessions
- Analyzing existing system architecture
- Reviewing security design decisions
- Creating threat documentation
- Training teams on threat identification
- Compliance and audit preparation
## Do not use this skill when
- The task is unrelated to stride analysis patterns
- You need a different domain or tool outside this scope
## Instructions
- Clarify goals, constraints, and required inputs.
- Apply relevant best practices and validate outcomes.
- Provide actionable steps and verification.
- If detailed examples are required, open `resources/implementation-playbook.md`.
## Resources
- `resources/implementation-playbook.md` for detailed patterns and examples.
This skill applies the STRIDE methodology to systematically identify threats across system components, data flows, and user interactions. It delivers categorized threat findings, suggested mitigations, and verification checks to support threat modeling, security reviews, and documentation.
You provide architecture artifacts or a verbal description of the system, assets, and trust boundaries. The skill inspects components and data flows, maps observations to STRIDE categories (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege), and generates prioritized findings with concrete mitigation and verification steps. It can produce artifacts for threat-modeling sessions and security documentation.
What inputs does the skill need?
Provide architecture diagrams or a component and data-flow description, plus scope, trust boundaries, and any known constraints or threat actors.
Will it produce actionable mitigations?
Yes. Each identified threat is paired with concrete mitigations and verification steps such as tests, logging checks, or configuration changes.