01Severity-based issue prioritization (Critical to Low)
02Systematic 5-phase security audit workflow
030 GitHub stars
04Comprehensive checklist for XSS, SQLi, CSRF, and IDOR
05Automated mapping of user inputs and attack surfaces
06Detailed reporting with evidence and concrete fix suggestions