Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
mattboddy47 authored Apr 8, 2024
1 parent 6933d14 commit c185f25
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
<!-- ![Fred the Ghost](src/images/ghost_logo.png) -->
<img alt="Fred the ghost" src="src/images/ghost_logo.png" width=15% height=15%>

This tool is in pre-alpha. There is no guarentee that the architecture of the Epic Threat Model is not itself vulnerable. There is also no guarentee that it will find all of the threats in the Threat Modelled environment. The only guarentee is that the tool (along with Fred the ghost) will do its very best to help wherever it can.
This tool is in pre-alpha. There is no guarantee that the architecture of the Epic Threat Model is not itself vulnerable. There is also no guarantee that it will find all of the threats in the Threat Modelled environment. The only guarantee is that the tool (along with Fred the ghost) will do its very best to help wherever it can.

## Intro
The Epic Threat Model is designed for Developers and Security Engineers to quickly identify security flaws in their cloud application implementation plans. It is designed to be quick to use so that the Threat Modeller can keep up with an Agile process releasing many times every day. It achieves a faster speed by doing away with data-flow-diagrams as well as some other aspects of Threat Modelling to keep the platform simple. It makes it possible to work to a many releases per day cycle by working at the Epic level.
Expand Down

0 comments on commit c185f25

Please sign in to comment.