Threat Dragon comes in two variants, a desktop application and a web application.
To install the desktop application, use the installers available for download from the OWASP GitHub area:
.rpm
for Red Hat Linux, AIX, CentOS, Fedora.deb
for debian based Linux such as Ubuntu, Trisqel and Debian itselfPackages for both Debian and Fedora Linux on AMD64 and X86-64bit platforms can be downloaded from the releases area. Platform independent application installers Snap and AppImage are also provided.
Download the .dmg
MacOS installer from the releases area.
Open the download and drag ‘OWASP Threat Dragon’ to the application directory.
When the install has finished, run Threat Dragon from launchpad or from Finder / Applications.
Download the Windows .exe
installer from the releases area.
Run the installer and invoke the application from the shortcut.
As an alternative to using a released version of the the Threat Dragon desktop application,
npm
can be used to install and run Threat Dragon locally:
git clone https://github.com/owasp/threat-dragon
cd threat-dragon
npm install
This allows access to the latest code updates between releases,
To run the Threat Dragon desktop application in development mode:
npm run start:desktop
To build an installer:
npm run build:desktop
Threat Dragon: making threat modeling less threatening