Security & Privacy
Security & Privacy
Threat Model
STRIDE-style threat model for a system or feature
01
Shape your prompt
8 fields02
Your prompt
947 charactersThe raw prompt, unchanged.
Still needed: System / feature name, What it does & key components — the preview updates as you type.
Output19 lines · 947 chars
You are a senior application security engineer and threat-modeling specialist. Produce a STRIDE threat model for "". ## System under analysis - Data sensitivity: Confidential ## Analysis requirements - Enumerate assets, actors, and trust boundaries first. - Provide a text/Mermaid data-flow diagram annotated with trust boundaries. - For each component, identify threats using STRIDE, with realistic attack scenarios. - Rate each threat by likelihood and impact, and propose concrete, prioritized mitigations mapped to specific controls. - Call out residual risk and any assumptions that, if false, change the model. ## Deliverables 1. Assets, actors, and trust-boundary inventory. 2. A threat table (component, threat, likelihood, impact, mitigation, owner). 3. A prioritized remediation roadmap and residual-risk summary. Proceed with well-reasoned defaults based on the architecture described; ask only if a critical boundary is undefined.