01Evaluates webhook security and signature verification patterns
02Identifies missing rate limiting and backoff implementations
03Suggests resilience patterns like circuit breakers and idempotency keys
04Detects high-latency synchronous API calls in request paths
050 GitHub stars
06Scans for sensitive data leakage including API keys and PII in logs