Apiiro Blog ﹥ Continuous, Accurate Threat Modeling Is Now…
Company News, Product

Continuous, Accurate Threat Modeling Is Now a Reality with Apiiro’s Software Graph Visualization

Karen Cohen
VP Product
Published April 28 2025 · 4 min. read

Modern applications are incredibly complex and ever-changing. Code is spread across many repositories, frameworks, and cloud services, making it difficult for security teams to get a clear, up-to-date picture of how everything fits together. Traditional threat modeling often relies on static diagrams or developer interviews that become outdated almost immediately. Apiiro’s Software Graph Visualization tackles this challenge by providing an interactive, real-time map of your entire software architecture enriched with risk insights and context. This post dives into how the Software Graph works, explaining its architecture and unique capabilities, and shows why continuous, accurate threat modeling is finally achievable.

Building a Live, Usable Software Risk Graph

At its core, Software Graph Visualization is powered by Deep Code Analysis (DCA) and code-to-runtime context, the same underlying intelligence used to build Apiiro’s XBOM. The graph represents entities and relationships detected in your codebase, as well as runtime context. This includes:

  • Repositories, code modules, and pipelines
  • APIs (in code and at runtime)
  • Data models
  • Secrets
  • External dependencies
  • Artifacts and runtime containers
  • Sensitive data (e.g., PII, PCI, PHI)
  • Technologies (e.g., SDKs, frameworks)
  • Teams (code owners)
  • And more..

Entities appear in the graph as nodes, with directional edges that reflect real relationships like which module contains which API, which component uses which secret, or how sensitive data relates to generative AI usage.

As code and runtime context update, the graph continuously updates. There’s no “snapshotting” or manual syncing required. See the demo.

Interactive, Question-Driven Graph Exploration

Designed to reflect common security review workflows, the Software Graph comes ready with a set of predefined built-in questions. Each question presents a tailored graph view that focuses on relevant node types, edges, and properties, reducing noise and making the graph easier to interpret and act on.

This improves both usability and signal-to-noise ratio.

Predefined built-in questions include:

  • Technology Stack: Visualizes the frameworks, SDKs, and tools used throughout the codebase. Helpful for identifying architectural drift or tracking third-party usage (e.g., analytics or GenAI libraries).
  • Exit Points: Maps outbound connections from services or modules, including third-party APIs, cloud platforms, and other external dependencies. This view is especially relevant for privacy reviews, compliance (e.g., FedRAMP), and attack surface analysis​.
  • API Attack Surface: Shows all APIs exposed by the system, both in code and at runtime. APIs are grouped by method (e.g., GET vs. POST) to distinguish between data exposure and ingestion paths. This is particularly useful for pen-test scoping and identifying entry points​.
  • Data Exposure: Illustrates where sensitive data (e.g., PII, PHI, PCI) is present in the system, how it moves through services, and where it may leave the environment. The graph connects sensitive data fields to modules, APIs, and external services, allowing quick assessment of whether proper controls are in place​.
  • Blast Radius: Visualizes how open source and internal packages are connected across your architecture, helping you trace risk propagation paths. When a vulnerability is found in a shared dependency, this view shows where it’s used and what else it could impact – so you can assess scope, prioritize fixes, and respond faster.

These views can be further refined or saved as custom questions for repeated use. See it in action.

Fine-Grained Control: Filtering, Sizing, Grouping, and Highlighting

Security teams have fine-grained control over what the graph displays and how it’s visualized. Nodes can be filtered to show only entities that match specific properties, for example, internet-exposed APIs with critical risk scores. Nodes can be grouped based on shared attributes like HTTP method or topology. Node size can be adjusted dynamically to reflect the number of connections or the risk level of a component, helping high-impact elements stand out. Visual badges can be toggled to overlay key metadata such as risk score, programming language, deployment status, or the presence of PII.

The graph also supports interactive exploration: users can hover to preview details, click to expand metadata panes, or right-click to perform actions like locking a node’s neighbors or finding the path between two components.

Integrated Risk Awareness

Every entity in the graph is tied to Apiiro’s broader risk analysis engine. The risk level of each node can be used to influence display (e.g. size by risk severity), allowing teams to visually prioritize what matters. This bridges the gap between structural visibility and actual security decision-making.

Example: Tracking GenAI Data Flow

With the rapid proliferation of GenAI, it’s crucial to assess the security implications of how these new frameworks are integrated into applications. When a GenAI client is present, the Software Graph can surface the code module making the call, the exposed APIs connected to that module, and whether sensitive data, such as PII, could reach the external service. This enables security teams to quickly answer questions like “Are we sending PII to an external GenAI model?” or “Which module needs a data handling review?” without switching tools or manually tracing the flow.

Integrated with XBOM and Explorer

The graph is fully connected to the rest of the Apiiro platform. Teams can pivot between table-based views in Explorer and visual views in Graph, using the same filtering logic and query language.

Exploratory workflows like:

  • Showing all APIs and their matched routable endpoints with critical runtime risks
  • Finding all secrets in repositories that contain GenAI and PII data but without KMS
  • Tracing exposed sensitive data (PII, PHI, PCI) accessible via a network vulnerability with a known exploit
  • Detecting critical/high network vulnerabilities accessible via unauthenticated, internet-facing APIs

…can all be run in Explorer, then visualized instantly using the Graph button. Filters and configurations are preserved across views​.

Export, Share, Document

For collaboration and audit use, teams can save questions (graphs with full configuration), share via link (graph state is preserved), export to GraphML (for external graph tools or documentation), and export to PDF (including visual legend and metadata)​.

Wrapping Up

Apiiro’s Software Graph Visualization is a dynamic, continuously updated representation of how your software is architected and how that architecture intersects with security, risk, and data flow.

It’s tightly scoped, highly configurable, and purpose-built to support modern AppSec workflows.

If you’re already using Apiiro’s platform, this feature is available today for preview. If not, and you’re tired of reviewing security risks without understanding the structure they live in, this is worth a look.

Learn more about Software Graph Visualization →