01Automated identification and flagging of embedded secrets and API keys
02Proactive phishing and Business Email Compromise (BEC) detection
03Right-to-left domain verification for URL and email safety
04Detection of social engineering signals like urgency and authority pressure
05Enforcement of secure channels for sensitive data and credential handling
06277 GitHub stars