01Analyzes cryptographic APIs for algorithm selection footguns and type confusion.
02Identifies stringly-typed security patterns that enable injection and privilege escalation.
03Detects dangerous configuration defaults and magic values that silently disable security.
04Evaluates API ergonomics to ensure the path of least resistance is the most secure.
050 GitHub stars
06Surfaces silent failure modes where security checks are bypassed without explicit errors.