01Verification of FFI boundaries and secure pointer arithmetic
02Cryptographic usage review for industry-standard library compliance
030 GitHub stars
04Comprehensive audit of 'unsafe' blocks and memory safety invariants
05Automated identification of injection, path traversal, and DoS vectors
06Standardized security reporting with severity levels and remediation steps