Get Started with ThreatMitigator
3 min read
Get Started with ThreatMitigator
Start identifying security threats in your infrastructure configurations in minutes.
Installation
| |
For enterprise customers, pre-built binaries are available for Linux (x86_64, ARM64), macOS (Intel, Apple Silicon), and Windows (x86_64). Contact sales@threatmitigator.app for access.
Quick Start
| |
CLI Commands
| Command | Alias | Description |
|---|---|---|
scan terraform <PATH> | s tf | Scan Terraform files for security threats |
scan python <PATH> | s py | Scan Python code for vulnerabilities |
scan dfd <PATH> | s dfd | Generate threat model from DFD specification |
discover <PATH> | d | Scan source code for network connections and generate DFDs |
query <ID> <QUESTION> | q | Get AI-powered mitigation suggestions for a specific threat |
init [TARGET] | i | Initialize threat modeling in a project |
check-drift <PATH> | drift | CI-optimized security drift detection |
completions <SHELL> | - | Generate shell completions (bash, zsh, fish, PowerShell) |
Global Flags
| Flag | Description |
|---|---|
--verbose / -v | Increase logging verbosity (repeatable: -v, -vv, -vvv) |
--quiet / -q | Suppress non-essential output |
--no-color | Disable colored output |
--config / -c | Path to configuration file |
--format | Output format (json, yaml, sarif, markdown, pdf, table) |
Configuration
Configuration File
All options can be set in .threatmitigator.toml:
| |
Configuration Precedence
- Command-line flags (highest priority)
- Environment variables (
THREATMITIGATOR_*prefix) - Configuration file (
.threatmitigator.toml) - Built-in defaults
Severity Filtering
| |
Review Detected Threats
Examine the results:
| |
Enable AI Remediation (Optional)
Get intelligent fix recommendations:
| |
Supported providers:
- OpenAI: Set
OPENAI_API_KEY - Anthropic: Set
ANTHROPIC_API_KEY - Ollama: Set
OLLAMA_HOST(e.g.,http://localhost:11434)
Track Threats Over Time
Mark threats as accepted, mitigated, or false positive:
| |
Commit .threatmodel.yaml to version control to track changes over time.
Next Steps
- Read the Documentation - Full documentation
- Create Custom Policies - Custom policies guide
- Contact Support - Get help from our team at support@threatmitigator.app
Need Help?
- Documentation: docs.threatmitigator.app
- Support: support@threatmitigator.app
- Sales: sales@threatmitigator.app