How it works
- Input analysis: Neo reads your PRD, design docs, architecture diagrams, API specs, or user stories from Files
- Asset identification: it identifies what you’re protecting (user data, money, access, availability, trust)
- Attack surface mapping: Neo maps entry points, trust boundaries, and external dependencies
- Threat identification: it identifies realistic threats based on your specific context (not generic theory)
- Checklist generation: Neo produces actionable security requirements for developers to follow during implementation
- Review integration: outputs can be added to tickets, PRs, or design review docs
Prerequisites
- Design docs, PRDs, architecture diagrams, or user stories in Files
- Optional: existing security standards or past threat models in Files for consistency
- Optional: integration with Jira, Linear, or GitHub for automated checklist delivery
Usage
For a New Feature
Prompt example: “Review the design doc for the file sharing feature. Generate a threat model and create a security checklist for developers building this feature.” What Neo does:- Reads the design doc to understand feature scope and user flows
- Identifies sensitive assets (files, user permissions, access logs)
- Maps attack surface (upload endpoints, download links, sharing mechanisms)
- Generates practical threats (unauthorized access, malicious file uploads, link enumeration)
- Creates a developer checklist with specific requirements for this feature
- Optionally posts checklist to Jira ticket or GitHub issue for tracking
For a Product or System
Prompt example: “Analyze our payment processing system architecture. Create a threat model and identify security requirements for the next sprint.” What Neo does:- Analyzes architecture to identify components, data flows, and trust boundaries
- Identifies high-risk areas (payment data handling, PCI scope, third-party integrations)
- Maps realistic attack scenarios based on your specific implementation
- Generates prioritized security requirements by component
- Creates actionable tasks that fit into your sprint planning
Automated Threat Model Generation
Neo can automatically generate threat models during your planning stage by integrating with your ticketing system. Configure this once in your Neo account, and threat models will be created whenever new feature tickets are opened.Setup
-
Configure integration in your Neo account settings:
- Connect Jira, Linear, or GitHub via Environment Variables
- Enable automatic threat model generation
- Set trigger conditions (labels, issue types, or project-specific rules)
-
Define triggers:
- Auto-generate for tickets labeled
security-review,new-feature, orarchitecture-change - Trigger on specific issue types (Epic, Story, Feature Request)
- Set project or repository filters to scope automation
- Auto-generate for tickets labeled
-
Customize outputs:
- Choose where to attach threat models (comment, linked document, or dedicated field)
- Configure checklist format (inline, attached file, or sub-tasks)
- Set notification preferences for security team review
How It Works
When a new ticket is created:- Neo detects the ticket creation via webhook or polling
- Extracts context from ticket description, labels, and linked documents
- Reads referenced design docs, PRDs, or specs from Files or ticket attachments
- Generates threat model and security checklist based on feature description
- Posts results as a comment or attachment to the ticket
- Optionally creates sub-tasks for each security requirement
- Notifies security team for review and approval
Example: Jira Integration
Example: Linear Integration
Example: GitHub Integration
Configuration Options
In your Neo account, you can configure:- Trigger rules: Which tickets/issues should generate threat models
- Context sources: Where to pull additional context (Files, wiki, previous tickets)
- Output format: Comment, attachment, sub-tasks, or custom fields
- Approval workflow: Require security team review before development starts
- Update behavior: Auto-update threat model when ticket description changes
- Notification settings: Who gets notified when threat models are generated
Benefits
- Zero manual effort: Threat models created automatically at ticket creation
- Consistent coverage: Every new feature gets security consideration
- Early visibility: Security requirements identified before development starts
- Developer guidance: Clear checklist available from day one
- Audit trail: All threat models tracked and versioned with tickets
Example Outputs
Developer Security Checklist
Neo creates a practical, actionable checklist:Common Use Cases
Design Review Integration
“We’re reviewing the architecture for a new multi-tenant dashboard. Generate a threat model focused on tenant isolation and create security requirements for the engineering team.” Neo will:- Analyze tenant boundary risks
- Identify data leakage scenarios between tenants
- Generate checklist items for query filtering, access control, and testing
- Flag high-risk areas like shared caches or global search
Sprint Planning
“For sprint 23, we’re building OAuth integration with Google. What security threats should we consider and what should developers implement?” Neo will:- Identify OAuth-specific risks (token leakage, CSRF, redirect manipulation)
- Generate checklist for secure token storage, state parameter validation, redirect URI validation
- Provide testing requirements for authorization code flow
Architecture Change Assessment
“We’re migrating from monolith to microservices. Update our threat model to reflect new attack surface and service-to-service communication risks.” Neo will:- Compare old vs new architecture
- Identify new threats from service boundaries and network exposure
- Generate requirements for service authentication, API gateways, and secrets management
- Prioritize risks by migration phase
Third-Party Integration
“We’re integrating with Stripe for payments. Create a threat model and checklist for PCI compliance and secure payment handling.” Neo will:- Map payment data flows and PCI scope
- Identify risks around API key management, webhook verification, and data handling
- Generate checklist for tokenization, webhook signature validation, and logging restrictions
- Link to PCI DSS requirements where applicable
Integration with Development Workflow
At Design Review
- Attach design docs to Files
- Prompt: “Generate threat model and security requirements for [feature name]”
- Review threat model with team, adjust based on feedback
- Add checklist items to Jira epic or GitHub issue template
- Store finalized threat model in Files for reference
During Sprint Planning
- Reference threat model from design phase
- Break security requirements into tasks
- Assign checklist items to relevant developers
- Set acceptance criteria that include security verification
- Schedule security review before sprint end
At Code Review
- Developer marks checklist items as complete in PR description
- Reviewer verifies implementation against checklist
- Neo can automatically verify certain items (e.g., check for rate limiting, validate token generation)
- Security sign-off required before merge
Post-Launch
- Store final threat model and completed checklist in Files
- Use as baseline for future similar features
- Update Memory with lessons learned
- Schedule periodic re-assessment as architecture evolves
Tips for Effective Threat Modeling
Be Specific About Your Context
Instead of: “Create a threat model for our API” Better: “Create a threat model for our customer data export API. Users can request CSV exports of their order history. Files are generated async and stored in S3 for 24 hours.”Focus on Realistic Threats
Neo prioritizes threats based on:- Your actual attack surface (what’s exposed?)
- Data sensitivity (what’s worth attacking?)
- Likelihood (has this happened to similar systems?)
- Impact (what’s the worst case?)
Iterate as You Build
Threat models aren’t static documents:- Update when architecture changes
- Add new threats discovered during implementation
- Refine checklist based on what actually worked
- Store updates in Files for history

