01Detection of credential harvesting in .env, SSH, and cloud configuration files
02Identification of prompt injection and persistence mechanisms in skill instructions
031 GitHub stars
04Static analysis for dangerous shell commands and network exfiltration patterns
05Behavioral analysis of hooks and file operations to track unauthorized data access
06Structured security report generation with risk levels and remediation guidance