Skip to content

AI Co-Pilot threat analysis for security professionals. Identifies vulnerabilities, assesses risks, and suggests mitigations across digital systems, processes, and infrastructure. Covers STRIDE methodology and OWASP risks, attack vectors, and defensive measures.

Notifications You must be signed in to change notification settings

p0bailey/ThreatWolf

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 

Repository files navigation

ThreatWolf

ThreatWolf Logo

Threat modelling GPT copilot for CyberSecurity professionals. Identifies vulnerabilities, assesses risks, and suggests mitigations across digital systems, processes, and infrastructure. Covers STRIDE methodology and OWASP (Infrastructure, APIs, Web Applications, Data, LLMs, Generative and Agentic AI) risks, attack vectors, and defensive measures.

Capabilities

ThreatWolf supports the following assessments:

Domain Framework & Link
Infrastructure Security OWASP Top 10 Infrastructure Security Risks
API Security OWASP API Security Top 10
Web App Security OWASP Web Application Top 10
Data Security OWASP Data Security Top 10
LLM App Security OWASP Top 10 for LLM Applications
Agentic AI Security (2025) Custom Agentic AI Top 10 by Phillip Bailey (2025)

Use Cases

  • Architecture risk reviews
  • Secure design workshops
  • Generative and Agentic AI system risk assessments
  • API and application threat analysis
  • Infrastructure threat modelling

How to Use

  1. Visit: 🐺 ThreatWolf on ChatGPT
  2. Upload your architecture diagram (e.g. C4, DFD, Swagger)
  3. Add additional context:
    • Industry, compliance requirements, criticality level
    • Technical stack, deployment model, user types
    • Existing security controls and known risks

Example Prompts

  • “Assess this architecture using OWASP Infrastructure Top 10.”
  • “Identify API5:2023 risks in this OpenAPI spec.”
  • “Model prompt injection in this GenAI system.”
  • “Simulate an agent misuse based on the Agentic AI Top 10.”
🔍 Click to view example screenshots

Screenshot 2

Screenshot 3

Screenshot 4

Screenshot 5

Screenshot 6

Screenshot 7

Notes

  • No data is stored between sessions
  • Works best with diagrams or structured descriptions
  • Built for cybersecurity architects, security teams, and red teams

Critical Disclaimer

CRITICAL: Users must independently verify all threats, vulnerabilities, and security information provided. This analysis is for guidance only, do not act on recommendations without proper verification through authoritative sources.

About

AI Co-Pilot threat analysis for security professionals. Identifies vulnerabilities, assesses risks, and suggests mitigations across digital systems, processes, and infrastructure. Covers STRIDE methodology and OWASP risks, attack vectors, and defensive measures.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published