01Detection of destructive commands and unauthorized system file writes
02Recursive analysis of referenced shell, Python, and Node scripts
030 GitHub stars
04Structured security reports with risk level assessments from Safe to Malicious
05Identification of prompt injection and AI-specific security bypasses
06Scanning for secret exfiltration and suspicious network requests