01Detects hardcoded credentials, API keys, and sensitive tokens
020 GitHub stars
03Analyzes authentication and authorization implementation flaws
04Identifies injection vulnerabilities including SQL, NoSQL, and XSS
05Scans for API risks like CSRF, CORS misconfigurations, and missing rate limits
06Evaluates data protection measures and encryption standards