Threat Dragon comes in two variants, a desktop application and a web application.
To install the desktop application, use the installers available for download from the OWASP GitHub area:
.rpm for Red Hat Linux, AIX, CentOS, Fedora.deb for debian based Linux such as Ubuntu, Trisqel and Debian itselfPackages for both Debian and Fedora Linux on AMD64 and X86-64bit platforms can be downloaded from the releases area. Platform independent application installers Snap and AppImage are also provided.
Download the .dmg MacOS installer from the releases area.
Open the download and drag ‘OWASP Threat  Dragon’ to the application directory.
When the install has finished, run Threat  Dragon from launchpad or from Finder / Applications.
Download the Windows .exe installer from the releases area.
Run the installer and invoke the application from the shortcut.
As an alternative to using a released version of the the Threat Dragon desktop application,
npm can be used to install and run Threat Dragon locally:
git clone https://github.com/owasp/threat-dragon
cd threat-dragon
npm install
This allows access to the latest code updates between releases,
To run the Threat Dragon desktop application in development mode:
npm run start:desktop
To build an installer:
npm run build:desktop
Threat Dragon: making threat modeling less threatening