Overview
This article walks you through how to build attack routes in Hyver’s mitigation graph by creating positions, drawing edges, and linking them to findings. These steps are essential for modeling realistic attack paths and translating your risk into a visual, actionable format.
You'll learn how to build connections between nodes in the graph, and how to associate them with the relevant security issues.
Step 1: Enter Edit Mode
Toggle Edit Graph to On in the toolbar.
Any changes you make will be saved automatically.
Step 2: Add a Position
Before adding edges, make sure your graph already contains:
At least one threat source
At least one business asset
Then:
Choose a position type:
Middle position — one incoming and one outgoing edge.
Aggregated position — combines inputs from multiple routes; multiple outputs possible.
Drag and drop the icon onto the graph or double-click to place it:
Click Rename position to give it a meaningful name:
Use the dropdown to select existing position names (if not already used).
Optional: Click Reset to clear associated data from the position.
At any point, right-click the position and choose Edit this position to update it.
Step 3: Draw an Edge and Link a Finding
Click the position and drag the arrow to the next position or business asset:
When you release, the Create a New Finding wizard opens:
Use this to link the edge to a finding using one of the following methods:
Finding templates — Select a predefined template.
Your findings — Choose from findings you've already created.
Requires Editor + Findings & Graph Initiator permissions at the engagement level.
Blank finding: Vulnerability or Potential — Start from scratch for a standard or unconfirmed issue.
Blank finding: Capability — Create a finding that reflects an access or trust condition, not a flaw:
Then:
Complete the required fields and click Done.
You'll see a confirmation with additional options, such as:
Share the finding
Add remediation assets
Add supporting evidence
You can do these now or return directly to the graph.
Wrap-up / Next Steps
Creating edges and linking findings is a core part of building meaningful attack paths in your mitigation graph. Each edge tells a story — of risk, access, and where to act. Once you’ve built your path, explore mitigation planning and route highlighting to guide next steps.





