01Validation of security guardrails, rate limits, and audit logging.
02Excessive agency assessment based on OWASP LLM06 standards.
03Deep analysis of prompt injection surfaces in RAG documents and tool outputs.
04Comprehensive permission inventory for tools, MCP servers, and file systems.
05Mapping of potential data exfiltration paths and credential leaks.
065 GitHub stars