Skip to main content
Integration Ecosystem

ThreatZ Integrations for Your
Engineering Workflow

ThreatZ integrates with 30+ tools across architecture modeling, code analysis, SBOM management, DevOps, security testing, and identity management. No lock-in — works with the tools your teams already use.

Explore ThreatZ
30+
Integrations
7
Categories
4
Vulnerability Feeds
7+
Export Formats
Cybersecurity Engineering Pipeline

How ThreatZ Models Your Automotive
Cybersecurity Program

From network analysis through to OEM VSOC streaming and threat-intel ingest — 15 connected stages arranged around a single source of truth, aligned with ISO/SAE 21434 and UNECE R155. Click any stage to see which tools plug in there.

01

Network & Communication Matrix

Import bus signals, comm-matrix metadata, and protocol stacks. Foundation for asset and threat modelling downstream.

Connected tools

  • ARXML
  • DBC
  • VSS (Vehicle Signal Specification)

Don't see your tool?

Tell us which tool you use at this stage. We add new connectors based on real customer requests.

Data interchange: SARIF 2.1.0, Generic JSON, CycloneDX, SPDX v2.3 / v3, ReqIF, OpenXSAM, STIX, AUTOSAR, NVD, CNVD, OSV, GitHub Security Advisories.

How the data actually flows

Top 5 Integrations
In Detail

Beyond the logo wall — the concrete data, format, and direction for the five integrations our customers configure first. Each diagram shows what crosses the boundary, in what serialization, and in which direction.

Vector CANoe — CAN-bus and Automotive-Ethernet test execution

Data flow: ThreatZ test plan to TestBench Agent to Vector CANoe to vehicle hardware, results returning to ThreatZ TARA. Dashed strokes denote optional or asynchronous return paths. ThreatZ test plan + threats TestBench Agent CAPL + Python harness Vector CANoe simulation + bus access Vehicle / ECU CAN / CAN-FD / Ethernet invoke drive stim resp trace verdict Results returned as Vector test report (XML) + BLF/ASC/MF4 trace; ThreatZ normalises pass/fail per-threat into the TARA model.

Direction: Bi-directional. Trigger: ThreatZ test campaign or CI pipeline invokes pre-authored CAPL test modules and Python harness scripts via the TestBench Agent. Format: Vector test report (XML) + BLF / ASC / MF4 trace, plus PCAPNG export from CANoe (signed by the TestBench Agent before upload). Auth: TestBench Agent local credential; CANoe licence per workstation (Vector dongle/SmartCard) or CANoe4SW server edition for CI.

MATLAB & Simulink — System Composer architecture import

Data flow: MATLAB System Composer architecture exported as SLX (native) or SysML XMI via the System Composer SysML interface, imported into ThreatZ which builds the asset graph and identifies trust boundaries for TARA. Dashed strokes denote optional or asynchronous return paths. System Composer components, ports, interfaces, stereotypes SLX (native) or SysML XMI via SysML iface ThreatZ Design asset graph + trust boundaries TARA threat scenarios on the graph export import scope cybersecurity requirements (ReqIF) feedback

Direction: One-way for the architecture (in); cybersecurity requirements feed back via ReqIF (Requirements Toolbox). Trigger: Model release / baseline update. Format: SLX (System Composer native) or SysML v1 XMI via the System Composer SysML interface; SysML v2 textual import on R2024a+. ReqIF 1.2 for the return path. Auth: File-based handover, or programmatic via MATLAB Engine API on a licensed host. Captures System Composer components, ports, interfaces, and stereotypes (with linked Simulink behaviour references) — populates the asset inventory without manual entry.

Atlassian Jira — risk treatments and security tasks

Data flow: ThreatZ risk treatment generates Jira issue, engineers update status, ThreatZ syncs back via webhook. Dashed strokes denote optional or asynchronous return paths. ThreatZ Operations risk treatment + acceptance REST API OAuth 2.0 Jira issue project + epic + custom fields Engineering team workflow create post assign close webhook close Default 1:1 link between treatment and Jira issue; configurable as 1:N for split treatments.

Direction: Bi-directional. Trigger: Risk-treatment creation in ThreatZ, status change in Jira. Format: Jira REST + custom-field mapping. Auth: OAuth 2.0 / Connect (Jira Cloud) or PAT (Jira Data Center 8.14+). Webhook on the Jira side propagates closures asynchronously (typically seconds, no SLA from Atlassian). Default 1:1 treatment↔issue link; optional 1:N for split treatments (design change + verification + acceptance evidence).

GitHub — SBOM, CodeQL findings, and PR status checks

Data flow: GitHub repo emits SBOM and CodeQL findings via Actions, ThreatZ ingests and correlates against TARA, status check returns to the pull request. Dashed strokes denote optional or asynchronous return paths. GitHub repo Actions workflow on PR / push SBOM SPDX 2.3 / CycloneDX 1.6 CodeQL findings SARIF 2.1.0 ThreatZ ingest SBOM + SARIF + NVD/CNVD/OSV PR status check Checks API + annotations decision status check (pass / fail) back to the PR

Direction: Up-stack from GitHub Actions; status check + annotations back to the PR. Trigger: Push, pull-request, or scheduled workflow. Format: SPDX 2.3 SBOM via GitHub's native Dependency Submission API, or CycloneDX 1.6 via Anchore sbom-action / Syft / CycloneDX-GitHub-Actions; plus SARIF 2.1.0 (CodeQL or any third-party SAST that emits SARIF). Auth: GitHub App (required for the Checks API) with checks:write, contents:read, pull-requests:write; fine-grained PAT supported for ingest only (Checks API is App-only). Portability: the SBOM + SARIF ingest contract is portable to Jenkins and GitLab CI; the PR-feedback path uses each platform's native status surface (Jenkins Checks plugin, GitLab external status checks).

SonarQube — static-analysis findings correlated to TARA threats

Data flow: source code analyzed by SonarQube, issues pulled by ThreatZ via Web API as SARIF, mapped to SBOM components and TARA threat IDs, treatment status echoed back as resolution comments. Dashed strokes denote optional or asynchronous return paths. Source code CI build + sonar-scanner SonarQube issues, hotspots, quality gate Web API /api/issues/search → SARIF ThreatZ map → SBOM map → TARA threat scan pull ingest resolution comment Treatment decisions in ThreatZ flow back as SonarQube issue resolutions, keeping both tools in sync.

Direction: Pull from SonarQube; resolution echo back via the issues/hotspot status APIs. Trigger: Scheduled poll on a project, or post-scan webhook. Format: SonarQube Web API JSON (/api/issues/search, /api/hotspots/search) on SonarQube 9.x / 10.x; ThreatZ maps the response to SARIF 2.1.0 internally (Sonar has no native SARIF output for issues; rule IDs and CWE mappings are preserved). Auth: User token with project Browse permission for issues; See Source Code if snippet context is needed; Administer Security Hotspots only when reading hotspot details beyond summary. Compatibility: Same endpoints work on SonarCloud (Bearer token + organization key required) and self-hosted SonarQube Server.

For other integrations — or to confirm a payload schema before connecting your tooling — talk to a solutions engineer in a 30-minute walkthrough. Book a session →

Identity & Access

Enterprise
Single Sign-On

ThreatZ supports industry-standard identity providers for seamless authentication and access management across your organization.

Microsoft Entra ID Google Workspace GitHub SSO SAML 2.0 LDAP

SSO available on Professional and Enterprise plans. LDAP available on Enterprise with on-premise deployment.

Export & Interoperability

Speaks Your
Industry Language

Export your data in the formats your stakeholders need — from human-readable reports to machine-readable interchange standards compatible with tools like PTC Integrity, IBM DOORS, and Siemens Polarion.

Report Formats

Human-readable exports for stakeholders, auditors, and compliance teams.

PDF CSV Excel

Interchange Standards

Machine-readable formats for tool-to-tool interoperability across your engineering ecosystem.

ReqIF SARIF 2.1.0 OpenXSAM STIX AUTOSAR

ReqIF exports are compatible with IBM DOORS, Siemens Polarion, and PTC Integrity. STIX and AUTOSAR exports available on Enterprise plans.

Partner Program

Grow With VxLabs

Join our ecosystem as an integration partner or reseller and bring automotive cybersecurity to more teams worldwide.

Become an Integration Partner

Build a connector for your tool and reach 500+ automotive security professionals using ThreatZ.

  • Co-marketing & joint case studies
  • Dedicated integration documentation
  • Partner badge & logo placement
  • Priority engineering support

Become a Reseller

Join our global channel program and bring VxLabs products to OEMs and Tier-1 suppliers in your region.

  • Competitive reseller margins
  • Sales enablement & training
  • Technical certification program
  • Regional exclusivity options
Need a Different Integration?

We Are Always Expanding Our
Integration Ecosystem

Tell us which tools your teams use and we will prioritize them on our roadmap. Our extensible parser framework makes adding new integrations fast.

Explore ThreatZ
30+ Integrations Open Standards No Lock-In