Thr8

Thr8

AI-powered security analysis

10 followers

thr8.dev helps development teams find security vulnerabilities before deployment.
Interactive
Thr8 gallery image
Thr8 gallery image
Thr8 gallery image
Thr8 gallery image
Thr8 gallery image
Thr8 gallery image
Free
Launch Team
AssemblyAI
AssemblyAI
Build voice AI apps with a single API
Promoted

What do you think? …

T. Felder
Maker
📌

👋 Hey Product Hunt Fam!

I'm Travis Felder, founder of thr8.dev, and I'm stoked to share our launch with you 🚀 I've been building in public and obsessing over making security accessible to every developer – because let's face it, most of developers aren't security experts! 🙈

👾 What is thr8.dev?

thr8.dev is an AI-powered security analysis tool that helps developers catch security issues before they hit production. Simply upload your architecture diagrams (PNG, JPG, PDF – whatever you've got) and get instant security feedback. No security PhD required!

🧐 Why use thr8.dev?

Security bugs are expensive and stressful to fix in production. Most developers want to build secure apps but don't know where to start – with thr8.dev you can:

📊 Upload any diagram and get instant AI-powered security analysis

🔍 Spot vulnerabilities before they become expensive problems

🛡️ Get developer-friendly security insights (no jargon, just actionable advice)

🚀 Build with confidence knowing you've covered the security basics

🦄 How It Works

Just drag and drop your architecture diagrams – system designs, flow charts, database schemas or simply describe what you are planning to build. Our AI analyzes your setup and gives you clear, actionable security recommendations. Think of it as having a security expert review your designs, but instant and always available.

🎁 Join us

Ready to ship more secure code? Try thr8.dev for free and let us know what diagrams you upload – we're always improving based on real developer workflows!

Hit us up 📨 hello@thr8.dev or check us out at thr8.dev

Satyam Sharma

A professional tool should be less flashy!

T. Felder

Feature Update: Announcing the Thr8 Cyber Intelligence Center

We're excited to announce a significant enhancement to the Thr8 platform: the Cyber Intelligence Center. This update is designed to bridge the gap between theoretical threat modeling and real-world, actionable security insights by integrating data from trusted industry sources.

Thr8 now goes beyond identifying potential threats in your architecture; it proactively cross-references your results with vulnerabilities that are actively being exploited in the wild right now.

What's New?

  • CISA KEV Integration: Thr8 now automatically ingests and maintains an up-to-date feed of the CISA Known Exploited Vulnerabilities (KEV) catalog. This ensures your analysis is informed by one of the most trusted and timely sources for real-world threat intelligence.

  • AI-Powered Threat Correlation: After generating a threat model, our AI engine intelligently cross-references your identified threats against the KEV catalog. This process automatically flags threats in your system that correspond to vulnerabilities being actively exploited, elevating them for immediate review.

  • New KEV Correlation Icon : Look for the new Cyber Intelligence icon next to threats on your Dashboard and Threat List pages. This icon provides an at-a-glance indicator that a threat has been correlated with a known, real-world exploit.

  • Enhanced Recommendations & Dashboard:

    • The "Recommendations" section in your project reports now features a dedicated "URGENT" category for KEV-correlated threats, helping you prioritize with precision.

    • The main Dashboard now includes a "Cyber Intelligence Center" tab, giving premium users a direct view of the latest vulnerabilities added to the CISA feed.

  • Dedicated Filtering: The Threat List page now includes a filter for "KEV Intel", allowing you to instantly isolate all threats that have been correlated with known exploits across all your projects.

How to Get the Most Out of This Feature

  1. Re-Analyze Key Projects: Run a new analysis on your critical projects to see if any existing threats are flagged with the new KEV intelligence.

  2. Prioritize with the Icon: When triaging, give special attention to threats marked with the icon. These represent a higher, more immediate risk.

  3. Create Focused Worklists: On the Threat List page, use the "KEV Intel" filter to create a high-priority worklist for your team to address first.

  4. Stay Informed: Check the "Cyber Intelligence" tab on your main Dashboard to stay aware of new, high-impact vulnerabilities as they are cataloged by CISA.

This feature is a direct result of user feedback aimed at making threat modeling more practical and actionable. We are committed to helping you bridge the gap between theoretical risks and real-world security posture.

Thank you for helping us make Thr8 better