01Confirms correct resource deployment order and dependency handling
02Analyzes plan-vs-actual drift to prevent state corruption
03Validates IAM policies against least-privilege security standards
04Audits security groups and networking rules for potential vulnerabilities
05Detects destructive resource deletions and high-risk modifications
060 GitHub stars