01Detects 'fail-open' fallbacks for environment variables and secrets
02Differentiates between production-critical vulnerabilities and safe test/dev environments
03Identifies permissive access controls like open CORS or insecure file permissions
04Scans for hardcoded credentials and weak default authentication settings
05Flags outdated or weak cryptographic algorithms in security-sensitive contexts
060 GitHub stars