Skip to main content
Data Flow Explorer
Multi-level Data Flow Diagrams for the ThreatWeaver platform β€” showing Local branch. Click any diagram to explore and navigate to connected documentation.
System Data Flow (L0)
Overall platform data flow showing all external sources, internal services, and data consumers.
View Diagram
Tenable Sync Pipeline (L1)
Detailed sequence of the Tenable.io data import flow β€” export polling, normalisation, and KPI recalculation.
View Diagram
Scanner Data Pipeline (L1)
AppSec scan data flow from assessment config through 56 attack agents to enriched findings in PostgreSQL.
View Diagram
Authentication & Session Flow (L1)
Full request lifecycle for login, JWT issuance, and subsequent authenticated requests with tenant resolution.
View Diagram
Single-Tenant Data Isolation (L2)
Request flow in dedicated deployment mode β€” DEPLOYMENT_MODE=dedicated bypasses schema switching and uses the public schema.
View Diagram
Multi-Tenant Schema Isolation (L2)
Request flow in SaaS deployment mode β€” per-tenant schema isolation via dynamic search_path and TLM lookup.
View Diagram
Webhook & Event Flow (L2)
Outbound webhook delivery with HMAC-SHA256 signing and retry logic, plus real-time SSE scan progress events.
View Diagram
API Error Handling Flow (L2)
Request validation pipeline β€” Zod schema checks, JWT auth, role enforcement, tenant resolution, and error responses.
View Diagram