01Automated detection of technology stacks, frameworks, and dependency risks
02Hierarchical 'Recon Pyramid' methodology for structured codebase exploration
03Comprehensive entry point and data flow tracing across multiple languages
04Visual-ready architectural mapping and trust boundary identification
0554 GitHub stars
06Standardized security context documentation and function-level analysis templates