AI-powered threat modeling that turns architecture diagrams and business context into actionable threats.
English | 日本語
Public Demo: https://threat-thinker.melonattacker.com
Important
This is a public demo environment. Please do not upload sensitive or confidential architecture diagrams. For sensitive use cases, use the local CLI or Web UI.
Important
AI can make mistakes. Do not trust Threat Thinker's output as-is; review the results and judge their correctness before using them.
Threat Thinker is an open-source tool that turns system descriptions, architecture diagrams, and business context into threat models automatically. Provide a natural-language system description or a DFD/architecture diagram as the system shape, add Business Context for scope and assumptions, and optionally use RAG to bring in supporting standards or internal guidance.
Key Features:
- Description-to-DFD: Generates an intermediate Graph IR DFD from a natural-language system description when no diagram is available.
- Diagram coverage: Ingests Mermaid, draw.io, Threat Dragon JSON, native Graph IR JSON, and images.
- Business Context: Injects scope, actors, assets, assumptions, and constraints from PDF, Markdown, or text files.
- Attribute inference: Uses LLMs to enrich components, data flows, and trust boundaries.
- RAG boost: Strengthens threat reasoning with retrieved local docs/KB snippets (e.g., OWASP/MITRE/internal).
- Threat Dragon: Imports Threat Dragon diagrams and can export findings back in Threat Dragon format.
- Reports: Exports Markdown, JSON, and HTML for reviews and automation.
- Provide
--descriptionwhen you do not have a diagram, or drop in a diagram via CLI (--diagramor format-specific flags) or Web UI. - Supports Mermaid, draw.io, Threat Dragon JSON, native Graph IR JSON, and image-based diagrams.
- Deterministic parsing plus LLM reasoning fills missing labels, trust boundaries, and protocols.
- Outputs prioritized threats with short rationales and OWASP ASVS/CWE references for quick review.
Input diagram and get prioritized threats automatically
- Use
--descriptionfor the system description that can generate a DFD when no diagram is provided. - Use
--contextto add required business context that is not visible in the DFD or architecture diagram. - Include scope, actors, sensitive assets, workflows, regulatory assumptions, availability needs, and audit expectations.
- Threat Thinker injects the full extracted text from PDF, Markdown, or text files into the threat prompt.
- Combine Business Context with RAG when you also want supporting references retrieved from larger KBs.
- Build on-disk knowledge bases from PDFs/Markdown/HTML with
threat-thinker kb buildunder~/.threat-thinker/kb/<name>. - Enable
--ragin CLI or the “Use Knowledge Base” toggle in Web UI to retrieve relevant chunks from security guidelines and your org's guidance. - Retrieval stays local; only the final prompts go to your chosen LLM provider.
- Tune top-k per run and swap KBs per project to balance depth, speed, and relevance.
Build local knowledge bases and use them to strengthen threat reasoning
- Import Threat Dragon v2 JSON with
--threat-dragon, preserving layout and cell metadata. - Export a Threat Dragon-compatible JSON that embeds detected threats without regenerating positions.
- Re-open the exported JSON in Threat Dragon to review or adjust cells with the added findings.
- Markdown/JSON/HTML reports stay available alongside Threat Dragon output for broader sharing.
Import and export Threat Dragon diagrams with embedded threat findings
Threat Thinker uses LLM for extracting diagrams from images, extracting components, data flows, and trust boundaries from architecture diagrams, and for inferring threats. Threat Thinker supports OpenAI, Anthropic Claude, AWS Bedrock (Claude v3+ models), and local Ollama APIs (for text-only flows).
You must set at least one of the following environment variables before use:
# For OpenAI API (e.g., gpt-4.1)
export OPENAI_API_KEY=...
# For Claude API (e.g., claude-sonnet-4-5)
export ANTHROPIC_API_KEY=...
# For Bedrock API (e.g., anthropic.claude-sonnet-4-5-20250929-v1:0)
# Option 1: Use AWS Profile (recommended)
aws configure --profile my-profile
# Then use --aws-profile my-profile in the command
# Option 2: Use environment variables
export AWS_ACCESS_KEY_ID=...
export AWS_SECRET_ACCESS_KEY=...
export AWS_SESSION_TOKEN=...- Start Ollama locally (default host
http://localhost:11434) and pull a model (e.g.,ollama pull llama3.1). - Run Threat Thinker with
--llm-api ollama --llm-model <model> [--ollama-host http://localhost:11434]for Mermaid/Draw.io/Threat Dragon inputs. - Image extraction is not supported with the Ollama backend; use text-based diagram inputs instead.
Choose one of the following methods:
Using pipx
pipx install threat-thinkerUsing uv
uv tool install threat-thinkerpip install threat-thinker
# Or install from a GitHub Release wheel
pip install https://github.com/melonattacker/threat-thinker/releases/download/v0.8.0/threat_thinker-0.8.0-py3-none-any.whl
# Or install the latest from main
pip install git+https://github.com/melonattacker/threat-thinker.gitNote: If you see
externally-managed-environmenterror, usepipxoruvinstead, or create a virtual environment first.
git clone https://github.com/melonattacker/threat-thinker.git
cd threat-thinker
uv sync --extra dev --frozen
# Fallback if uv is unavailable
python3 -m venv .venv
source .venv/bin/activate
pip install -e .[dev]threat-thinker version
threat-thinker -v
threat-thinker --helpHere is an example of command using CLI mode.
# Think: Generate a DFD from a system description, then analyze threats
threat-thinker think \
--description "Customers use a web app to manage orders. The app stores customer PII in Postgres and sends email through a third-party provider." \
--topn 5 \
--llm-api openai \
--llm-model gpt-4.1 \
--out-dir reports/
# Think: Analyze a diagram
threat-thinker think \
--diagram examples/diagrams/web/system.mmd \
--context examples/diagrams/web/business-context.md \
--infer-hints \
--topn 5 \
--llm-api openai \
--llm-model gpt-4.1 \
--out-dir reports/
# Diff: Compare two threat reports and analyze changes
threat-thinker diff \
--after reports/new-report.json \
--before reports/old-report.json \
--llm-api openai \
--llm-model gpt-4.1 \
--out-dir reports/ \
--lang en
# Run threat analysis with local Ollama (text-only diagrams)
threat-thinker think \
--mermaid examples/diagrams/web/system.mmd \
--llm-api ollama \
--llm-model llama3.1 \
--ollama-host http://localhost:11434 \
--out-dir reports/
# Serve: Launch API server
threat-thinker serve --config examples/demo-app/serve.example.yaml
# Worker: Start background processor for queued jobs
threat-thinker worker --config examples/demo-app/serve.example.yaml# Launch Web UI
threat-thinker webuiThen visit http://localhost:7860 to use Threat Thinker interactively.
- docs/tutorials.md — Guided runs for web, AWS, and diff scenarios.
- docs/cli.md — Flag reference and examples for think/diff/kb commands.
- docs/design.md — Architecture and processing flow across the five layers.
- docs/rag.md — Building and using local knowledge bases to strengthen threat reasoning.
- docs/reports.md - Report formats and contents for Markdown, JSON, HTML, Threat Dragon and diff outputs.
