01Evaluates configuration schemas for dangerous or insecure defaults
02Detects error-prone API design patterns and architectural 'footguns'
03Promotes 'pit of success' principles in software architecture
04Identifies designs that violate 'secure by default' standards
052 GitHub stars
06Reviews cryptographic library ergonomics for potential developer misuse