01Audits for stringly-typed security values that enable injection
02Identifies algorithm and mode selection footguns in security APIs
03Evaluates API ergonomics against misuse-resistance principles
04937 GitHub stars
05Detects dangerous configuration defaults and unvalidated parameters
06Surfaces silent failure patterns where security checks are bypassed