-
**[ UUID ]** 7b6b3209-7e42-494f-b1fd-78bf47cba943
**[ Session Name ]** Hand-Crafted Threat Modeling \o/
**[ Primary Space ]** Privacy and Security
**[ Secondary Space ]** Web Literacy
**[ Submitter'…
-
Describe what problem your feature request solves:
Currently the tool does a good job for decomposing the architecture and applying threats according to the STRIDE framework. This still leaves some g…
-
The text, diagram, and table data for provided image for section **Analyzing threats** is unreadable. I have great eyesight and I really have to squint to read the table data and the diagram. This ima…
-
**Title of the talk/workshop**
Creating Secure OTPs: Best Practices
**Abstract of the talk/workshop**
I will be presenting on "Creating Secure OTPs: Best Practices." Initially, I'll discuss the i…
-
All the Screen shots details are small and text is unreadable. Allow users to click and expand or replace all the images with larger, higher quality. You could just zoom in using the Thread Modelling …
-
### Current Behavior
Dependency-Track supports Service BOMs. From the CycloneDX website:
>SaaSBOMs compliment Infrastructure-as-Code (IaC) by providing a logical representation of a complex syste…
-
First apologies for the long winded issue...
**tl;dr** - Are there any plans in extending out some plantuml sequence diagram functionality?
I've been using pytm for about a week now and have fou…
-
start with java web application by analyzing web.xml, bundled jars, etc.
-
# [Inconfido](https://github.com/INCONFIDO): Flow Verified Projects Ledger (FVPL)
# Grant category
Please select one or more of:
- [ ] Open source maintenance
- [X] Developer tools / service…
iJrod updated
2 years ago
-
The security document provides some nitty gritty, but it would be nice to have both a more approachable, user-friendly explanation and also a hard-core tech explanation. Both have merit.