01Detects inline role checks and hardcoded permission strings
02Audits for deny-by-default security configurations and missing firewalls
0347 GitHub stars
04Provides severity-based classifications for all detected security risks
05Flags complex authorization logic embedded directly in controllers
06Identifies missing Voter or Policy design patterns for resource access