01Network ACL vulnerability and risk scanning
02Detailed reporting on access misconfigurations
033 GitHub stars
04Compliance checking against security best practices
05Automated IAM policy analysis for cloud environments
06Identification of hidden privilege escalation paths