01Evaluates cryptographic library ergonomics and usage patterns
02Identifies 'stringly-typed' security risks and type confusion
03Audits configuration schemas for dangerous or insecure defaults
04Detects 'footgun' designs in API and library interfaces
050 GitHub stars
06Flags silent failure modes that mask underlying security issues