01Threat-modeling-as-code implementation patterns
02Automated STRIDE-per-element threat analysis
03DREAD risk scoring and vulnerability prioritization
0412 GitHub stars
05Data Flow Diagram (DFD) generation and trust boundary mapping
06Attack tree construction for visualizing complex attack vectors