Built data-flow diagrams can be analyzed for threats following a modified STRIDE methodology. Found threats can be filtered and prioritized. By setting a threats applicable status, a better overview over a systems potential threats can be gained. Additionally, defining this status creates anonymised data for machine learing purposes, further improving the analysis in the future.