
Threat Modeling Workbench
Build structured security reviews from threat discovery to mitigation planning. This plugin helps teams map attack paths, extract concrete security requirements, and turn risks into prioritized controls.
Install
Run this command to install all skills in this plugin:
npx skillstore add @threat-modeling-workbench Skills will be installed to .claude/skills/ directory
Overview
Usage Guide
Enhanced by AIDetailed Guide
## Overview Threat Modeling Workbench gives security teams and developers a structured end-to-end workflow — from mapping attacker goals to shipping tested controls. It combines attack-tree-construction, security-requirement-extraction, and threat-mitigation-mapping into one cohesive plugin so nothing falls through the cracks between discovery and remediation. ## Quick Start 1. **Map attack paths** — Use `attack-tree-construction` to visualize how an attacker could reach a target. Describe the system and the attacker goal; the skill decomposes it into a structured tree of sub-goals and conditions. 2. **Extract requirements** — Feed the tree output into `security-requirement-extraction`. It translates each threat node into concrete, testable security requirements and user stories your engineering team can act on immediately. 3. **Prioritize controls** — Run `threat-mitigation-mapping` on the requirement list. The skill connects each threat to an appropriate control, scores remediation priority, and produces a plan your team can track. ## Key Commands - **attack-tree-construction** — Build a visual threat tree for a given attacker goal or system boundary; great for architecture reviews and stakeholder communication. - **security-requirement-extraction** — Turn raw threat descriptions into structured security requirements, acceptance criteria, and test cases. - **threat-mitigation-mapping** — Match threats to NIST/CIS controls or custom mitigations; outputs a prioritized remediation backlog ready for sprint planning. ## Tips - Run all three skills in sequence for a complete threat review: tree → requirements → mitigations. - Pair with a compliance plugin (e.g., SOC 2 or ISO 27001) to cross-reference extracted requirements against control frameworks automatically. - Use `attack-tree-construction` early in the design phase to catch architecture-level risks before they reach production.
Skills
3attack-tree-construction
Safe 69Build comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.
security-requirement-extraction
Safe 69Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.
threat-mitigation-mapping
Safe 69Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.
Similar Plugins

OpenClaw Security Monitor
Automated security scanning, vulnerability analysis, and code security review for authorized assets
3 skills

Application Security Toolkit
Scan code, dependencies, and running targets with a unified AppSec workflow
3 skills

Frontend Release Gate
A pre-release workflow for UI-heavy changes that catches broken flows, lint/type regressions, and obvious security issues before shipping.
3 skills