
Threat Modeling Projects Overview
Overview
Threat Modeling Projects act as dedicated workspaces for analyzing application components, API endpoints, and security risks. Each project contains:- API endpoint inventory
- Automatically generated threat findings
- Threat severity & confidence analytics
- Project-level completion status
- Collaborators & permissions
- Workload distribution and ownership
Key Metrics & Insights
Total Endpoints
Total API endpoints included in the modeling scope of the project.
Total Threats
Count of all identified or generated threats across the project.
Progress Status
Tracks how much threat analysis is completed for the project.
Project Workspace

Project Workspace View
- Project title & description
- Total endpoints
- Total threats
- Collaborators
- Started date
- Progress bar showing modeling completion
Project Details
Inside each project, users gain access to multiple components:🔹 API Endpoints
A complete list of scanned or manually added endpoints including:- Method
- Host
- Path
- Threat count
- Threat status
🔹 Threats
Auto-generated or manually added threats appear with:- Severity
- Confidence
- Owners
- State (Pending, Acknowledged, In Progress, etc.)
🔹 Metrics
Charts summarizing threat severity distribution, status counts, and resolver workload.🔹 Collaborators
A view to manage project-level permissions and designate threat owners.
API Endpoints Overview
Project Roles & Collaboration
Teams can add collaborators with specific roles:- Owner — full access; responsible for all threat approvals
- Manager — can analyze threats, assign owners, and update states
- Member — can review and assist in threat analysis

Project Collaborator Controls
Threat Generation Workflow
Each project integrates automated threat modeling:- AI analyzes API requests
- Threats are generated using structured rules
- Each threat includes:
- Title
- Explanation
- Severity
- Confidence
- Practical mitigations
- OWASP & CWE mappings
- References

Threat Management Inside Project
Dashboard-Level Visibility
The Threat Modeling Dashboard aggregates data from all projects:
Threat Modeling Dashboard Overview
- Total threats across all projects
- Pending vs In Progress vs Verified
- Severity distribution (Critical / High / Medium / Low)
- Per-project threat breakdown
- CWE classification across large datasets
Example Use Cases
API Threat Modeling
Analyze microservices and endpoints to identify backend weaknesses.
Secure Design Review
Evaluate system architecture and business logic flows.
Regulatory Compliance
Maintain audit-ready threat modeling documentation.
Developer Collaboration
Give developers visibility and ownership over threat mitigation.
Next Steps
Explore API Endpoints
Begin analyzing API paths, methods, and threat exposures inside each project.