| Added | - •Parser: 16 annotation types, 25+ comment styles, v1 backward compatibility
- •Parser: External reference support (cwe, capec, owasp), severity levels
- •Analyzer: Coverage statistics, dangling ref detection, duplicate ID detection
- •Analyzer: SARIF 2.1.0 export for GitHub/GitLab Security tab
- •Analyzer: Suggestion engine with 14 patterns for common security scenarios
- •Diff: Threat model comparison between git refs, change classification
- •Report: Markdown report with executive summary and Mermaid DFD diagram
- •Report: Compact diagram mode for high-exposure codebases
- •Init: Project initialization with multi-agent support (Claude Code, Cursor, Windsurf, Cline, Codex, GitHub Copilot)
- •Init: Behavioral directive injection for automatic annotation by AI agents
- •MCP: 12 tools (parse, validate, status, suggest, lookup, threat_report, threat_reports, annotate, report, dashboard, sarif, diff) and 3 resources
- •CLI: 12 commands (init, parse, status, validate, report, diff, sarif, mcp, threat-report, annotate, dashboard, scan)
- •TUI: Interactive terminal interface with command palette, autocomplete, and inline help
- •Dashboard: HTML threat model dashboard with exposure explorer, file tree, and threat report viewer
- •Agents: Unified agent launcher (Claude Code, Cursor, Windsurf, Cline, Codex, Gemini CLI) with config resolution chain
- •Threat Reports: AI-powered threat analysis using STRIDE, DREAD, PASTA, and other frameworks
- •CI: --strict flag on validate, --fail-on-new on diff for CI gates
|