{"skill":{"slug":"threat","displayName":"Threat","summary":"Deep threat modeling workflow—system decomposition, trust boundaries, STRIDE-style threats, mitigations, prioritization, and tracking. Use when designing new...","tags":{"latest":"1.0.0"},"stats":{"comments":0,"downloads":114,"installsAllTime":1,"installsCurrent":0,"stars":0,"versions":1},"createdAt":1774633028059,"updatedAt":1774633607742},"latestVersion":{"version":"1.0.0","createdAt":1774633028059,"changelog":"- Initial release of the deep threat modeling workflow skill.\n- Provides a structured, six-stage process covering scope, diagramming, STRIDE-style threats, mitigations, prioritization, and iteration.\n- Includes practical tips, exit conditions, and a final review checklist for effective team-driven threat modeling.\n- Designed for use during new feature design, architecture review, or responding to compliance and security requirements.","license":"MIT-0"},"metadata":null,"owner":{"handle":"mike47512","userId":"s17916ncgb6bpm0fs1wdm6932d83gha4","displayName":"mike47512","image":"https://avatars.githubusercontent.com/u/199718167?v=4"},"moderation":null}