01Real-time tracking of security control implementation and verification
02Categorized threat distribution by STRIDE and severity levels
03Visual summaries of assets, data flows, and attack surfaces
04Baseline comparisons to monitor security drift and recent changes
050 GitHub stars
06Compliance mapping for OWASP Top 10 and SOC2 frameworks