01Command injection analysis for hooks using interpolation patterns
02Detection of hardcoded API keys and secrets in tool configurations
030 GitHub stars
04Automated vulnerability scanning for instruction files and agent definitions
05Adversarial Deep Analysis using a Red/Blue team pipeline for high-stakes audits
06Risk assessment for MCP servers and shell-running supply chain threats