Lightweight, security-first threat modelling workflow for code and architecture tasks. Use it to walk all 7 PWNISMS categories, identify plausible threats, prioritize top risks, and propose concrete mitigations before and during implementation.
For EVERY security-relevant task (feature, bug fix, refactor, infra change, architecture design), run a lightweight threat model with PWNISMS.
Collect these quickly before deep analysis:
If the user provided specific code, diffs, or architecture artifacts, prioritize those as primary evidence.
Application and business-logic threats:
Compute and infrastructure threats:
Network and transport threats:
Identity and authorization threats:
Credential and key management threats:
Detection and auditability threats:
Dependency and delivery threats:
When discussing designs before code exists:
When implementing code, enforce these baseline controls:
Before finalizing output, confirm:
If ANY box cannot be checked, you MUST flag the gap to the user with a specific remediation recommendation before finalizing the code.