Skip to content

User Manual2

Version: Final (2025-09-29) — Matches the shipped system: React UI, Express API, Python scan engine (TCP), Supabase.

  1. Overview
  2. Quick Start
  3. Signing In & Account Access
  4. Home
  5. Dashboard
  6. Managing APIs
  7. History & Reports
  8. Settings
  9. Help, Privacy & Terms
  10. Troubleshooting
  11. FAQ
  12. Keyboard & Productivity Tips
  13. Glossary

APIs have become a critical component of modern software systems, enabling seamless data exchange and integration across applications. However, this growing reliance on APIs also increases their exposure to security threats such as unauthorized access, data breaches, and injection attacks. The API Threat Assessment Tool provides a comprehensive solution for identifying, analyzing, and mitigating these risks. This manual introduces the tool, outlines its features, and guides you through its installation, configuration, and usage to ensure your APIs remain secure and compliant with industry standards.

The API Threat Assessment Tool is designed to help developers, security analysts, and system administrators identify, assess, and mitigate potential security risks in APIs. With the increasing reliance on APIs for application integration and data exchange, ensuring their security is critical to prevent data breaches and maintain system integrity.

APIs are a common target for cyberattacks, such as injection attacks, broken authentication, and data exposure. This tool addresses these threats by providing automated scanning, threat detection, and actionable security recommendations.

• Users can import an API specification either by uploading a YAML or JSON file or by entering API details manually. • Add and manage endpoints and tags to ensure all relevant parts of the API are included in the assessment. • Scan the API against the OWASP Top 10 API Security Risks, either all at once for a complete assessment or individually for targeted checks. • Generates a comprehensive security report after each scan, highlighting vulnerabilities and providing actionable recommendations. • Ability to select specific security checks based on your organization’s priorities or compliance requirements. API Threat Assessment Tool – User Manual

This manual will guide you through the configuration and usage of the API Threat Assessment Tool, enabling you to protect your APIs from common and emerging threats effectively. NB – For ease of use, Chrome and Microsoft Edge browsers are recommended.

  • You bring: your API spec (OpenAPI).
  • AT-AT provides: guided workflows for importing, scanning, reviewing results, tagging/flagging, and sharing summaries.

Supported browsers: latest Chrome or Edge (recommended).

Landing


  1. Sign in or create an account.
  2. Import your API (OpenAPI JSON/YAML) or Add API details manually.
  3. Start a scan using a profile/check set.
  4. Monitor progress and view results.
  5. Use tags/flags to triage; share summaries if needed.

Login

  • Enter email/username and password.
  • Use Forgot password if you can’t sign in.
  • New here? Click Create account.

Signup

  • Provide first name, last name, email, username, and password.
  • Accept Terms & Conditions to complete registration.
  • Forgot: request a reset link; the app returns a generic success message (prevents user enumeration).
  • Reset: open the link from your email and set a new password.
  • Tokens are one-time and expire after 60 minutes.

The Home screen centralizes your primary actions.

Home

  • Run a Scan — launch the scan flow.
  • Explore Templates — browse preconfigured check sets.
  • View Reports — open recent results.
  • Manage APIs — add/import and configure your APIs.

The Dashboard aggregates key indicators and provides shortcuts to run scans or view reports.

Dashboard

See high-level stats, recent activity, and quick links to frequent actions.

From Dashboard or API pages:

  1. Select an API.
    Scan Shortcut
  2. Choose a profile or checks.
  3. Click Start Scan.
  • Watch status updates during execution.

Scan Shortcut

  • Manage APIs — go to API management
  • Scan Templates — open template library
  • Account Settings — update your profile
  • Documentation — open help resources

Centralize all the APIs you assess: import, edit, and organize.

API Management

Click Add API and enter the basics:

  • Name, Base URL, Description (optional)

Add API

Import a .json or .yaml/.yml OpenAPI file. The app validates file type/size and parses endpoints.

Import

Tips

  • Keep your spec valid (use an OpenAPI linter if possible).
  • Large specs import faster if you remove unneeded examples/schemas.

Review endpoints derived from your spec: method, path, parameters, and descriptions.

Endpoints

Use tags to categorize, and flags to highlight priority items.

Flags

Share summaries where appropriate (e.g., to your team).

Share

Schedule recurring scans if your build supports it.

Schedule


When complete, open the report to inspect findings.

Scan Report

  • Group by risk/test or endpoint.
  • Drill down to see evidence and guidance.
  • Export HTML/JSON where available. (PDF export is not part of this build.)

Browse past scans, filter by API or date, and re-open reports.

History

Tip: Use tags/flags to curate a shortlist for review meetings.


Update your profile, change your password, and adjust preferences.

Settings

  • Profile: name, email (verification may be required for changes)
  • Security: change password
  • Preferences: theme and UI options
  • Notifications: enable/disable categories

Access help resources and review your legal documents.

Privacy Policy
Privacy Policy

Terms of Service
Terms of Service

Contact Us
Contact Us


I can’t log in

  • Check your email/username and password.
  • Use Forgot password to reset credentials.

Import failed

  • Ensure the file is .json or .yaml/.yml.
  • Validate your spec (OpenAPI 3.x recommended).
  • Large specs: remove excessive examples or unused schemas.

No results after starting a scan

  • Confirm the engine is running (if self-hosted).
  • Re-open the History tab to check status; refresh if needed.

Screens look different

  • You may be on a newer build; this manual targets the final Demo-4 release.

Q: Do I need an OpenAPI file?
A: Yes. Scans are driven by your uploaded spec (JSON/YAML).

Q: Can I export PDF?
A: Not in this build. Use HTML/JSON exports where available.

Q: Are role-based permissions supported?
A: This build uses JWT on selected routes; fine-grained RBAC is out of scope.

Q: Can I schedule scans?
A: If your environment enables scheduling, the UI provides a Schedule option (see screenshot).


  • Search (/) or Ctrl/Cmd+K: jump to features.
  • Use tags/flags: group hot items for triage.
  • Open results in a new tab: keep context while reviewing multiple endpoints.

  • OpenAPI: a standard for describing REST APIs.
  • Endpoint: an API method+path (e.g., GET /users).
  • Tag/Flag: labels to organize and prioritize items.
  • Profile/Checks: sets of security tests to run.
  • Report: the findings produced after a scan.

End of manual.