01Identification of trust boundaries, entry points, and data flows
02Risk prioritization using qualitative likelihood and impact assessments
03Automated repository-grounded threat discovery and asset mapping
04253 GitHub stars
05Detailed enumeration of abuse paths and realistic attacker capabilities
06Actionable mitigation recommendations tied to specific code locations