Getting Started with ThreatForest¶
Welcome to ThreatForest! This guide will help you get up and running with AI-powered threat modeling in minutes.
Installation Steps¶
Step 1: Install ThreatForest¶
Step 2: Configure AWS Bedrock¶
Prerequisites
AWS Account with Bedrock access (Recommended - fully tested and supported)
Requires AWS Profile with IAM permissions for:
bedrock:Conversebedrock:ConverseStreambedrock:InvokeModel
Note: Other providers (Anthropic, OpenAI, Google Gemini, Ollama) are experimental and not fully validated.
Configure your AWS credentials for Bedrock access:
Option 1: AWS Profile (Recommended)
Configure an AWS profile that the ThreatForest wizard will use:
# Configure AWS profile
aws configure --profile your-profile-name
# AWS Access Key ID: [your-access-key]
# AWS Secret Access Key: [your-secret-key]
# Default region name: us-east-1
# Default output format: json
# Test Bedrock access
aws bedrock list-foundation-models --region us-east-1 --profile your-profile-name
When you run threatforest, the wizard will prompt you to: - Select your AWS profile name - Specify the AWS region (e.g., us-east-1)
Option 2: AWS Access Keys (Alternative)
Alternatively, you can provide AWS access keys directly when prompted by the wizard.
Step 3: Prepare Your Project¶
At minimum, ThreatForest needs one of the following in your project directory:
- ThreatComposer file (
.tc.json) - Recommended, created at threat-composer - README.md - Application description and architecture overview
- Architecture diagrams - PNG, PDF, Mermaid, or other diagram formats
Quick Setup:
Learn More
See the User Guide → Preparing Your Project for complete details on supported formats and best practices.
Step 4: Run Your First Analysis¶
The wizard will guide you through:
- Workflow Selection - Choose Full Analysis, Enrichment, or Mitigation
- Project Location - Specify project directory path
- AWS Configuration - Select AWS profile (if using Bedrock)
- Model Selection - Choose AI model
- Execution - Watch real-time progress
- Results - View summary and output files
Next Steps¶
Now that you have ThreatForest installed, explore these guides:
🚀 Running ThreatForest
Learn to use the interactive wizard and manage your workflow
📁 Preparing Your Project
Optimize inputs for better threat analysis results
📊 Understanding Results
Explore outputs and use the interactive dashboard
⚙️ How It Works
Technical deep dive into the analysis pipeline
Need Help?¶
Having issues? Check the FAQ Troubleshooting section for common problems and solutions.