Skip to main content
Version: Local Β· In Progress

Platform Modules

ThreatWeaver is composed of six integrated security modules. Each module works independently and shares a unified data model, auth layer, and real-time notification system.

Module Map​

ModulePrimary AudienceCore Capability
Exposure ManagementSecurity Analysts, CISOsUnified vulnerability visibility from Tenable Cloud
AppSec ScannerAppSec Engineers, Pentesters50+ AI-powered agents for automated black/gray/white-box pen testing
AI LabsSecurity EngineersVulnerability validation, deduplication, and predictive risk scoring
Cloud SecurityCloud Engineers, SREsInfrastructure monitoring, misconfiguration detection, compliance
Identity SecurityIAM Teams, Red TeamsAD exposure analysis, privilege escalation path detection
Admin & SettingsAdministratorsMulti-tenant management, SSO/SAML, licensing, user admin

Exposure Management​

The flagship module. Pulls vulnerability data from Tenable.io and Tenable.sc, enriches it with WeaverScore risk scoring, and surfaces it through filterable dashboards with fix planner integration.

β†’ Read the Exposure Management overview

AppSec Scanner​

50+ autonomous scanning agents covering OWASP Top 10, business logic flaws, authentication bypasses, injection, SSRF, file upload abuse, and more. Supports authenticated black-box, gray-box, and white-box assessments.

β†’ Read the AppSec overview

AI Labs​

AI-driven validation layer that cross-checks raw scanner findings against multiple signals before surfacing them. Reduces false positives by up to 60% in benchmark testing.

β†’ Read the AI Labs overview

Cloud Security​

Cloud infrastructure posture management: AWS/Azure/GCP asset inventory, misconfiguration detection mapped to CIS Benchmarks and SOC 2, and real-time drift alerts.

β†’ Read the Cloud Security overview

Identity Security​

Active Directory and IAM risk visibility: Kerberoastable accounts, DCSync rights, unconstrained delegation, privilege escalation paths visualised as attack graphs.

β†’ Read the Identity Security overview

Admin & Settings​

Multi-tenant administration: user provisioning, role management, SSO/SAML configuration, license activation, API key management, audit log export, and system health monitoring.

β†’ Read the Admin overview


Multi-Tenancy​

All modules are tenant-isolated. Data never crosses tenant boundaries at the database or API layer. See the Multi-Tenancy Architecture doc for schema-per-tenant isolation details.