Digital security has become essential in our interconnected world, yet many people find it overwhelming to protect their online presence - threatMap bridges this gap by providing a simple, visual way to understand and improve your digital security posture.
Maintaining a good digital posture is crucial as cyber attacks, such as phishing scams, ransomware, and social engineering, grow more frequent and sophisticated, exploiting even minor lapses in vigilance. Many attacks are easy to fall for—for instance, receiving an email that appears to be from your bank, urgently asking you to verify your account by clicking a link, which leads to a fake login page designed to steal your credentials. The elderly and those less technically aware are particularly vulnerable to such attacks, as they may lack familiarity with digital red flags, like misspelt URLs or suspicious sender addresses, making them prime targets for cybercriminals.
threatMap is a minimalistic web tool that helps visualize and improve your digital security posture by mapping authentication methods across your connected accounts.
threatMap helps you understand your digital security by:
- Mapping connections between your email accounts and connected services
- Evaluating authentication methods using the CASMM (Consumer Authentication Strength Maturity Model)
- Generating a visual security map with threat indicators
- Providing an exportable security assessment
- Creating AI-ready prompts for personalized security advice
- Account Mapping: Visualize relationships between primary accounts and connected services
- Security Assessment: Evaluate authentication methods on a scale of 1-8 using CASMM
- Threat Visualization: Clear indicators for security vulnerabilities
- Progress Tracking: Real-time progress bar during assessment
- Export Options: Save your security assessment as JSON
- AI Integration: Generate structured prompts for AI assistants
- Shared Password: Very risky, one breach affects all accounts
- Unique Password: Weak but unique passwords
- Quality Password: Strong but single-factor
- Password Manager: Unique, strong passwords
- SMS 2FA: Two-factor with SMS
- App-based 2FA: Two-factor with authenticator apps
- Codeless 2FA: Push notification authentication
- Passless: Biometric/security key authentication
- Visit threatmap.ashwath.ch
- Enter your primary email accounts
- List connected services for each account
- Rate authentication methods
- Review your security map and score
- Export results or get AI assistance
threatMap is built with vanilla web technologies, focusing on simplicity and performance:
- Frontend: Pure HTML, CSS, and JavaScript
- Styling: Custom CSS with CSS Variables for theming
- Animations: CSS transitions and keyframes
- Storage: Client-side only, no data persistence
- Dependencies: None - zero external libraries or frameworks
index.html
: Core HTML structure
CSS Structure:
css/core.css
: Base styles, variables, and animationscss/components.css
: Reusable component styles (buttons, inputs, cards)css/style.css
: Layout and page-specific stylescss/visualization.css
: Threat map and security grid visualization styles
JavaScript Structure:
js/core/config.js
: Configuration, constants, and CASMM level definitionsjs/core/store.js
: Central state management and data persistencejs/core/event.js
: Custom event system for component communication
Services:
js/services/accountService.js
: Account management and relationshipsjs/services/securityService.js
: Security level evaluation and scoringjs/services/vulnerabilityReport.js
: Threat analysis and reporting
Core Components:
js/threatMap.js
: Core threat mapping and visualizationjs/mapper.js
: Account relationship mapping and tree generationjs/app.js
: Application initialization and component orchestration
- Progress Bar: CSS transitions with JavaScript state management
- Security Grid: CSS Grid with dynamic content generation
- Account Map: ASCII-style visualization with HTML/CSS
- Notifications: CSS-animated toast notifications
- Export: Native JavaScript Blob and File APIs
This project is open-source and available under the MIT License .
Developed by ashfelloff