
Threat Modeling Projects Overview
Overview
Threat Modeling Projects act as dedicated workspaces for analyzing application components, API endpoints, and security risks. Each project contains:- API endpoint inventory
- Automatically generated threat findings
- Threat severity & confidence analytics
- Project-level completion status
- Collaborators & permissions
- Workload distribution and ownership
Key Metrics & Insights
Total Endpoints
Total Threats
Progress Status
Exploring Existing Projects

Threat Modeling Projects Overview
- Project name and short description
- Total Endpoints and Total Threats
- Progress bar to visualize activity and coverage
- Started date (how long the project has been active)
- Owner avatar to see who is responsible
- Metrics – overview of threats, severity distribution, and progress
- API Endpoints – list of imported endpoints and their threat status
- Threats – all generated or manually created threats
- Project Settings – collaborators and ownership
- Admin Settings – advanced controls for the project
Creating a New Project
To start threat modeling for a new application or service:Open the Projects page
Click Create Project

Threat Modeling Projects Overview
Fill in project details
- Name – a clear name such as
Snapsec Portal - Description – short context for the team (what this system does, environment, etc.)
- Select Collections – optionally attach one or more API collections (for example, Postman collections) that contain the endpoints you want to model.

Threat Modeling Projects Overview
Create the project
Importing API Endpoints into a Project
The API Endpoints tab is where you centralize all endpoints for a project. To import endpoints:Go to API Endpoints tab

Threat Modeling Projects Overview
Click Import API Endpoints

Threat Modeling Projects Overview
Upload your source

Threat Modeling Projects Overview
Review imported endpoints
- Endpoint path and name
- HTTP method
- Host
- Total threats
- Threat status and actions (re-generate, delete, etc.)
Importing Threats from CSV
If you already have threats defined in spreadsheets or another system, you can bulk-import them. To import threats:Open the Threats tab

Threat Modeling Projects Overview
Click Import Threats
Upload CSV file

Threat Modeling Projects Overview
Confirm and import
Downloading Threats as CSV
You can export threats to CSV for reporting, sharing with other systems, or offline analysis.Go to the Threats tab

Threat Modeling Projects Overview
Click Download CSV

Threat Modeling Projects Overview
Use the CSV output
- Threat title and description
- Severity, state, and confidence
- Linked endpoint information
- Timestamps and metadata
Adding or Removing Collaborators
Collaborators control who can see and manage a project. To manage collaborators:Open Project Settings

Threat Modeling Projects Overview
Add a collaborator

Threat Modeling Projects Overview
- Choose a user from the Collaborators dropdown
- Select a Role (Owner, Editor, or Viewer)
- Click Update Collaborator
Remove a collaborator

Threat Modeling Projects Overview
Setting a Default Threat Owner
The Default Threat Owner is the person who will be assigned as the owner for new threats when no specific owner is specified. To configure:Go to Project Settings

Threat Modeling Projects Overview
Choose Default Threat Owner
- Select a team member from the dropdown.

Threat Modeling Projects Overview
Save the setting
How it works