Scan your Terraform, CloudFormation, Docker, and Helm configurations to identify security threats before they reach production. STRIDE-based analysis with 90+ built-in policies and optional AI-powered remediation.
Comprehensive threat detection from infrastructure to application code
Parallel Rego evaluation with near-linear scaling. 1,000 resources in under 1.5 seconds.
Built-in STRIDE detection rules across all six categories. Write your own with Rego.
Your code never leaves your machine. AI features only send redacted threat metadata.
Terraform, CloudFormation, Docker, Helm. AWS, Azure, GCP, OCI, Alibaba Cloud.
Comprehensive security analysis powered by STRIDE, Rego, and optional AI
Automatically analyze infrastructure code against the STRIDE threat modeling framework. 90+ built-in policies covering Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. Also supports PASTA, LINDDUN, and VAST frameworks.
Industry-standard Rego policy language from Open Policy Agent, powered by Microsoft's Regorus runtime in Rust. 4x faster than legacy YAML engine with parallel evaluation. Write custom policies without recompiling.
Full support for Terraform (HCL 2 parsing, module resolution, variable interpolation), CloudFormation, Docker/Compose, and Helm charts. Multi-cloud coverage across AWS, Azure, GCP, OCI, and Alibaba Cloud.
Optionally connect your own LLM for context-aware remediation guidance. Supports OpenAI, Anthropic Claude, and local Ollama models. Your code never reaches AI providers—only redacted threat metadata.
Scan application source code to automatically detect network connections and generate Data Flow Diagrams. Identifies connections across HTTP, databases, gRPC, message queues, cloud SDKs, and more.
Severity-based exit codes for pipeline gating, CI-optimized check-drift command, and SARIF output for GitHub Advanced Security. Works with GitHub Actions, GitLab CI, Jenkins, and more.
From initialization to continuous monitoring in five simple steps
Set up threat tracking in your repository
threatmitigator initAnalyze IaC and source code for threats
threatmitigator scan terraform ./infraExamine threats with severity ratings
Get AI-powered fix guidance (optional)
threatmitigator queryMonitor drift and track threat lifecycle
threatmitigator check-driftExport results in the format that fits your workflow
Machine-readable for CI/CD pipelines and automation. YAML with git-friendly diffs.
GitHub Advanced Security integration, IDE support, and tool interoperability.
Executive summaries with charts, custom branding, and AI-enhanced remediation.
Documentation-ready reports for pull request comments and wikis.
Terminal summary for quick review during development.
Delta reports, compliance documentation, and custom branding options.
Custom threat detection, organization-specific policies, and external tool integration
Write plugins in any language using JSON-RPC 2.0 over stdin/stdout.
Plugins auto-detected from PATH as threatmitigator-plugin-* executables.
Memory limits, timeouts, and OS-level sandboxing (seccompiler/win32job).
One plugin crash doesn't affect others. Core scanning always continues.
Your infrastructure data stays under your control
All analysis runs locally. Zero external network calls in default mode. Your code never leaves your machine.
AI features use your API keys with your chosen provider. Only redacted threat metadata is sent—never source code, resource names, or IP addresses.
DoS protection limits, input validation, path traversal protection, secret redaction, and secure file permissions (0600) by default.
Pre-configured profiles for default, testing, and CI/CD environments. All limits configurable to match your requirements.
Join teams already using ThreatMitigator to identify security threats in their Terraform, CloudFormation, Docker, and Helm configurations.