风险评分

100/100 (Very Low)

OpenClaw: benign
VirusTotal: benign
StaticScan: clean

Threat

作者: mike47512
Slug:threat
版本:1.0.0
更新时间:2026-03-28 01:46:47
风险信息

OpenClaw: benign

查看 OpenClaw 分析摘要
The skill is an instruction-only threat-modeling facilitator whose requirements and instructions align with its stated purpose and do not request elevated access or external installs.

VirusTotal: benign VT 报告

静态扫描: clean

No suspicious patterns detected.
README

README 未提供

文件列表

无文件信息

下载
下载官方 ZIP
原始 JSON 数据
{
    "latestVersion": {
        "_creationTime": 1774633028059,
        "_id": "k97cnvksdbqj6xjn06a3p2pesn83pr04",
        "changelog": "- Initial release of the deep threat modeling workflow skill.\n- Provides a structured, six-stage process covering scope, diagramming, STRIDE-style threats, mitigations, prioritization, and iteration.\n- Includes practical tips, exit conditions, and a final review checklist for effective team-driven threat modeling.\n- Designed for use during new feature design, architecture review, or responding to compliance and security requirements.",
        "changelogSource": "auto",
        "createdAt": 1774633028059,
        "version": "1.0.0"
    },
    "owner": {
        "_creationTime": 0,
        "_id": "s17916ncgb6bpm0fs1wdm6932d83gha4",
        "displayName": "mike47512",
        "handle": "mike47512",
        "image": "https:\/\/avatars.githubusercontent.com\/u\/199718167?v=4",
        "kind": "user",
        "linkedUserId": "kn7c7ba9yjt2ch61hhrwdfedjd833p7t"
    },
    "ownerHandle": "mike47512",
    "skill": {
        "_creationTime": 1774633028059,
        "_id": "kd705ebzgpypkt1eke53zrqgjn83pen7",
        "badges": [],
        "createdAt": 1774633028059,
        "displayName": "Threat",
        "latestVersionId": "k97cnvksdbqj6xjn06a3p2pesn83pr04",
        "ownerPublisherId": "s17916ncgb6bpm0fs1wdm6932d83gha4",
        "ownerUserId": "kn7c7ba9yjt2ch61hhrwdfedjd833p7t",
        "slug": "threat",
        "stats": {
            "comments": 0,
            "downloads": 27,
            "installsAllTime": 0,
            "installsCurrent": 0,
            "stars": 0,
            "versions": 1
        },
        "summary": "Deep threat modeling workflow—system decomposition, trust boundaries, STRIDE-style threats, mitigations, prioritization, and tracking. Use when designing new...",
        "tags": {
            "latest": "k97cnvksdbqj6xjn06a3p2pesn83pr04"
        },
        "updatedAt": 1774633607742
    }
}