01Analysis of time-based logic and race conditions in business rules
02Identification of workflow step bypassing in multi-stage processes
03Detection of negative amount and price manipulation exploits
04Audit of coupon, discount, and referral system logic for abuse patterns
056 GitHub stars
06Validation of state machine integrity and unauthorized status transitions