About
This skill bridges the gap between high-level threat modeling and technical implementation by deriving specific, actionable security requirements from potential risks. It utilizes standardized frameworks like STRIDE to map threats to security domains—such as authentication, data protection, and logging—while automatically generating development-ready artifacts. By creating security user stories, acceptance criteria, and traceability matrices, it ensures that security is integrated directly into the development lifecycle and remains verifiable throughout the testing process.