Interactive tour
Guided walkthrough of terep's API-first threat modeling flow
Click through each step to see how terep takes you from DFD JSON to a System Knowledge Graph, STRIDE threats, history and diagrams you can plug into your own workflows.
Step 1 of 4
Step 1 · Define system & ingest DFD
Start with the system you actually ship
Create a system record, then push DFD JSON from your favorite modeling tool so terep can track architecture as it changes.
API flow
- • Bootstrap and log in via /auth/bootstrap and /auth/login to obtain a JWT.
- • Create a system with POST /systems, describing the application or service you want to model.
- • Ingest a DFD snapshot for that system via POST /systems/{systemId}/dfd/json using terep's DFD schema.
How it looks in terep
Create systemPOST /systems
System details
- Name: Payments API
- Owner: appsec@company.com
- Tags: prod, critical
DFD upload
POST /systems/{systemId}/dfd/json
trust_zones, processes, entities, data_stores, flows…
What you bring
- • DFDs exported or generated from tools like draw.io, Lucidchart or custom scripts.
- • Context on trust zones, processes, external entities, data stores and flows.
- • A list of priority systems you want to keep under continuous threat modeling.
1/4Use Next or click any step pill above to jump around the tour.
This interactive tour describes an illustrative version of terep to help you understand how DFD ingestion, SKG, STRIDE threats and versioned history could fit into your threat modeling practice.