Take inputs like a Pull Request, meeting transcripts, or governance and perform threat modeling