-
Describe what problem your feature request solves:
Currently the tool does a good job for decomposing the architecture and applying threats according to the STRIDE framework. This still leaves some g…
-
First of all, this is a great initiative. I think all developer teams can save a lot of time and find security more pleasurable to work with if they use this tool.
I have tested it using the gpt4-…
-
**[ UUID ]** 7b6b3209-7e42-494f-b1fd-78bf47cba943
**[ Session Name ]** Hand-Crafted Threat Modeling \o/
**[ Primary Space ]** Privacy and Security
**[ Secondary Space ]** Web Literacy
**[ Submitter'…
-
The text, diagram, and table data for provided image for section **Analyzing threats** is unreadable. I have great eyesight and I really have to squint to read the table data and the diagram. This ima…
-
### Describe the feature
I would like to be able to capture the status of any mitigations that are documented within threat composer
### Use Case
Mitigations are the "What are we going to do about …
-
All the Screen shots details are small and text is unreadable. Allow users to click and expand or replace all the images with larger, higher quality. You could just zoom in using the Thread Modelling …
-
**Title of the talk/workshop**
Creating Secure OTPs: Best Practices
**Abstract of the talk/workshop**
I will be presenting on "Creating Secure OTPs: Best Practices." Initially, I'll discuss the i…
-
### Current Behavior
Dependency-Track supports Service BOMs. From the CycloneDX website:
>SaaSBOMs compliment Infrastructure-as-Code (IaC) by providing a logical representation of a complex syste…
-
First apologies for the long winded issue...
**tl;dr** - Are there any plans in extending out some plantuml sequence diagram functionality?
I've been using pytm for about a week now and have fou…
-
start with java web application by analyzing web.xml, bundled jars, etc.