About
This skill bridges the gap between high-level security analysis and technical implementation by deriving structured security requirements from threat models and business context. By mapping threats to specific security domains like authentication, data protection, and logging, it enables developers and security engineers to generate traceable, testable user stories and acceptance criteria. It is particularly useful for ensuring compliance, building security architecture documentation, and automating the creation of security-focused test specifications within the development lifecycle.