Prompts for Security
Describe your application's architecture β what it does, how data flows, who accesses it β and get a structured threat model using STRIDE methodology. Outputs attack surfaces, threat scenarios ranked by risk, and specific mitigations you can implement this sprint.
Systematically identify, classify, and prioritize security threats for any application or system using STRIDE, attack trees, and trust boundary analysis β then output actionable mitigations ranked by risk.