01Secure, sandboxed execution with defense-in-depth isolation
02Path-sensitive analysis exploring all possible code paths
03Constraint solving using the Z3 solver to find trigger inputs
04Identification of inputs that cause specific exceptions
050 GitHub stars
06Verification of function contracts and code properties