Discovery and Data Flow Diagrams
Scan application source code to automatically detect network connections and generate Data Flow Diagrams for threat modeling.
Identifies connections across 10 categories including HTTP, databases, gRPC, message queues, cloud SDKs, and more.
Each connection is enriched with encryption status, authentication mechanism, trust zone classification, and data sensitivity.
Scan Python, Go, and Rust source code to discover network connections for DFD generation.
Generate DFDs as YAML, JSON, or quick summary views for programmatic and human consumption.
Automatic Connection Discovery
The discover command scans application source code to automatically detect network connections and generate Data Flow Diagrams for threat modeling.
Connection Detection
Identifies connections across 10 categories:
| Category | Examples |
|---|---|
| HTTP/HTTPS | REST APIs, webhooks, external service calls |
| Databases | PostgreSQL, MySQL, MongoDB, Redis, DynamoDB |
| gRPC | Service-to-service RPC definitions |
| Message Queues | Kafka, RabbitMQ, AMQP, SQS |
| Cloud SDKs | AWS, Azure, GCP service clients |
| WebSockets | Real-time communication channels |
| SMTP, SendGrid, SES integrations | |
| File Storage | S3, GCS, Azure Blob connections |
| Authentication | OAuth, SAML, LDAP connections |
| Caching | Redis, Memcached, ElastiCache |
Application Code Scanning
| Language | Detection |
|---|---|
| Python | Security vulnerability scanning |
| Go | Network connection discovery for DFD generation |
| Rust | Network connection discovery for DFD generation |
Security Annotations
Each detected connection is enriched with:
- Encryption status (TLS/plaintext)
- Authentication mechanism
- Trust zone classification
- Data sensitivity level
This context feeds directly into STRIDE threat analysis, helping identify spoofing risks at unauthenticated endpoints, tampering risks on unencrypted connections, and information disclosure through unprotected data flows.
Output
| |
Example Output
| |
Integration with IaC Scanning
ThreatMitigator combines Infrastructure as Code scanning with the Discovery command for complete coverage:
IaC Scanning Finds:
- Cloud resource configurations (EC2, S3, RDS, etc.)
- Network security groups and firewall rules
- IAM policies and permissions
Discovery Adds:
- Application-level API connections
- Third-party service dependencies
- Database connections from code
- Message queue usage patterns
- Authentication flow details
Combined Result: Complete attack surface map showing both infrastructure and application-level threats.
See it in action
Discover hidden attack surfaces by scanning application code for network connections and data flows.
Ready to Secure Your Infrastructure?
Join teams already using ThreatMitigator to identify security threats in their Terraform, CloudFormation, Docker, and Helm configurations.