Build threat models using the VAST (Visual, Agile, Simple Threat) methodology. Use when designing new systems, reviewing architecture for security, assessing attack surfaces, or when the user says "threat model", "attack surface", "security assessment", "VAST", "threat analysis", or "what could go wrong". Also use before major releases or after significant architecture changes.
Build actionable threat models using VAST — Visual, Agile, and Simple Threat modeling. Designed for DevOps environments, continuous integration, and real-world development velocity.
Map what you're protecting:
For each data flow crossing a trust boundary, ask:
Use references/vast-methodology.md for the full VAST process and threat categorization.
For each identified threat:
frontend-security-reviewer agentbackend-security-reviewer agentcloud-security-reviewer agentappsec-reviewer agentreferences/vast-methodology.md — Full VAST process, threat categories, severity scoring, mitigation patterns, and template for threat model documents.Subagents: Dispatch domain-specific security reviewers to validate mitigations:
frontend-security-reviewer — validates frontend mitigationsbackend-security-reviewer — validates backend/API mitigationscloud-security-reviewer — validates infrastructure mitigationsappsec-reviewer — validates auth, session, and supply chain mitigations