âĄ
Attack Path Architecture
AI-generated attack chain visualization with MITRE ATT&CK mapping
Attack Stages
đ
Reconnaissance
đĒ
Initial Access
âĄ
Execution
đ
Persistence
đĨ
Impact
đ Data Sources
CVE ContextNVD API
Attack PatternsMITRE ATT&CK
Exploit StatusCISA KEV
Chain GenerationLLM Analysis
đ¨ Visualization
Node Types5 attack stages
Edge StyleDirected arrows
Risk ColoringGradient by severity
InteractionClick to expand