AI-powered threat modeling that turns architecture diagrams and business context into actionable risks.
Public Demo: https://threat-thinker.melonattacker.com
Important
This is a public demo environment. Please do not upload sensitive or confidential architecture diagrams. For sensitive use cases, use the local CLI or Web UI.
Important
AI can make mistakes. Do not trust Threat Thinker's output as-is; review the results and judge their correctness before using them.
Threat Thinker is an open-source tool that turns architecture diagrams and business context into threat models automatically. Provide a DFD or architecture diagram as the system shape, add Business Context for scope and assumptions, and optionally use RAG to bring in supporting standards or internal guidance.
Key Features:
- Diagram coverage: Ingests Mermaid, draw.io, Threat Dragon JSON, native Graph IR JSON, and images.
- Business Context: Injects scope, actors, assets, assumptions, and constraints from PDF, Markdown, or text files.
- Attribute inference: Uses LLMs to enrich components, data flows, and trust boundaries.
- RAG boost: Strengthens threat reasoning with retrieved local docs/KB snippets (e.g., OWASP/MITRE/internal).
- Threat Dragon: Imports Threat Dragon diagrams and can export findings back in Threat Dragon format.
- Reports: Exports Markdown, JSON, and HTML for reviews and automation.
- Drop in a diagram via CLI (
--diagramor format-specific flags) or Web UI and get threats without manual modeling. - Supports Mermaid, draw.io, Threat Dragon JSON, native Graph IR JSON, and image-based diagrams.
- Deterministic parsing plus LLM reasoning fills missing labels, trust boundaries, and protocols.
- Outputs prioritized threats with short rationales and OWASP ASVS/CWE references for quick review.
Input diagram and get prioritized threats automatically
- Use
--contextto add required business context that is not visible in the DFD or architecture diagram. - Include scope, actors, sensitive assets, workflows, regulatory assumptions, availability needs, and audit expectations.
- Threat Thinker injects the full extracted text from PDF, Markdown, or text files into the threat prompt.
- Combine Business Context with RAG when you also want supporting references retrieved from larger KBs.
- Build on-disk knowledge bases from PDFs/Markdown/HTML with
threat-thinker kb buildunder~/.threat-thinker/kb/<name>. - Enable
--ragin CLI or the “Use Knowledge Base” toggle in Web UI to retrieve relevant chunks from security guidelines and your org's guidance. - Retrieval stays local; only the final prompts go to your chosen LLM provider.
- Tune top-k per run and swap KBs per project to balance depth, speed, and relevance.
Build local knowledge bases and use them to strengthen threat reasoning
- Import Threat Dragon v2 JSON with
--threat-dragon, preserving layout and cell metadata. - Export a Threat Dragon-compatible JSON that embeds detected threats without regenerating positions.
- Re-open the exported JSON in Threat Dragon to review or adjust cells with the added findings.
- Markdown/JSON/HTML reports stay available alongside Threat Dragon output for broader sharing.
Import and export Threat Dragon diagrams with embedded threat findings
Threat Thinker uses LLM for extracting diagrams from images, extracting components, data flows, and trust boundaries from architecture diagrams, and for inferring threats. Threat Thinker supports OpenAI, Anthropic Claude, AWS Bedrock (Claude v3+ models), and local Ollama APIs (for text-only flows).
You must set at least one of the following environment variables before use:
# For OpenAI API (e.g., gpt-4.1)
export OPENAI_API_KEY=...
# For Claude API (e.g., claude-sonnet-4-5)
export ANTHROPIC_API_KEY=...
# For Bedrock API (e.g., anthropic.claude-sonnet-4-5-20250929-v1:0)
# Option 1: Use AWS Profile (recommended)
aws configure --profile my-profile
# Then use --aws-profile my-profile in the command
# Option 2: Use environment variables
export AWS_ACCESS_KEY_ID=...
export AWS_SECRET_ACCESS_KEY=...
export AWS_SESSION_TOKEN=...- Start Ollama locally (default host
http://localhost:11434) and pull a model (e.g.,ollama pull llama3.1). - Run Threat Thinker with
--llm-api ollama --llm-model <model> [--ollama-host http://localhost:11434]for Mermaid/Draw.io/Threat Dragon inputs. - Image extraction is not supported with the Ollama backend; use text-based diagram inputs instead.
Choose one of the following methods:
Using pipx
pipx install https://github.com/melonattacker/threat-thinker/releases/download/v0.7.0/threat_thinker-0.7.0-py3-none-any.whlUsing uv
uv tool install https://github.com/melonattacker/threat-thinker/releases/download/v0.7.0/threat_thinker-0.7.0-py3-none-any.whlpip install https://github.com/melonattacker/threat-thinker/releases/download/v0.7.0/threat_thinker-0.7.0-py3-none-any.whl
# Or install latest from main
pip install git+https://github.com/melonattacker/threat-thinker.gitNote: If you see
externally-managed-environmenterror, usepipxoruvinstead, or create a virtual environment first.
git clone https://github.com/melonattacker/threat-thinker.git
cd threat-thinker
uv sync --extra dev --frozen
# Fallback if uv is unavailable
python3 -m venv .venv
source .venv/bin/activate
pip install -e .[dev]threat-thinker version
threat-thinker -v
threat-thinker --helpHere is an example of command using CLI mode.
# Think: Analyze a diagram
threat-thinker think \
--diagram examples/diagrams/web/system.mmd \
--context examples/diagrams/web/business-context.md \
--infer-hints \
--topn 5 \
--llm-api openai \
--llm-model gpt-4.1 \
--out-dir reports/
# Diff: Compare two threat reports and analyze changes
threat-thinker diff \
--after reports/new-report.json \
--before reports/old-report.json \
--llm-api openai \
--llm-model gpt-4.1 \
--out-dir reports/ \
--lang en
# Run threat analysis with local Ollama (text-only diagrams)
threat-thinker think \
--mermaid examples/diagrams/web/system.mmd \
--llm-api ollama \
--llm-model llama3.1 \
--ollama-host http://localhost:11434 \
--out-dir reports/
# Serve: Launch API server
threat-thinker serve --config examples/demo-app/serve.example.yaml
# Worker: Start background processor for queued jobs
threat-thinker worker --config examples/demo-app/serve.example.yaml# Launch Web UI
threat-thinker webuiThen visit http://localhost:7860 to use Threat Thinker interactively.
- docs/tutorials.md — Guided runs for web, AWS, and diff scenarios.
- docs/cli.md — Flag reference and examples for think/diff/kb commands.
- docs/design.md — Architecture and processing flow across the five layers.
- docs/rag.md — Building and using local knowledge bases to strengthen threat reasoning.
- docs/reports.md - Report formats and contents for Markdown, JSON, HTML, Threat Dragon and diff outputs.
