01Detects weak hashing and encryption algorithms like MD5, SHA1, and ECB mode
02Identifies hardcoded sensitive data including encryption keys and IVs
03Flags insecure random number generation and predictable seeds
04Detects timing attack vulnerabilities and disabled SSL/TLS verification
05Audits key management practices and missing integrity protection (MAC)
0645 GitHub stars