OWASP Threat Dragon Core has a new home!
Threat Dragon Core has been moved into OWASP/threat-dragon.
A historical version is kept here on the 1.4.0 branch. All new development, bugfixes, etc will take place in the threat-dragon, and all issues have been migrated.
Note that this repository has been migrated from Mike Goodwin's original , which has the issues and pull requests from June 2016 up to June 2020, until they were migrated to OWASP Threat Dragon in May, 2021.
Pull requests, feature requests, bug reports and feedback of any kind are very welcome, please head over to the OWASP Threat Dragon repository and check out the contributing page to get strated!
If you find a vulnerability in this project please let us know ASAP and we will fix it as a priority. For secure disclosure, please see the security policy.
- Mike Goodwin (mike.goodwin@owasp.org)
- Jon Gadsden (jon.gadsden@owasp.org)
- Leo Reading (leo.reading@owasp.org)