01Automated tracing of data from entry points to persistent storage or external APIs.
02Identification of trust boundaries and encryption/decryption checkpoints.
036 GitHub stars
04Generation of visual Mermaid data flow diagrams for architectural reviews.
05Configurable analysis depth ranging from high-level summaries to deep taint analysis.
06Detection of security weaknesses like missing validation or sensitive data in logs.