01Validation of authentication and authorization logic for least-privilege compliance.
02Input/Output sanitization audits to prevent injection, XSS, and SSRF attacks.
03Automated threat modeling to identify entry points and trust boundaries.
040 GitHub stars
05Security-focused dependency risk assessment and lockfile verification.
06Deep scan for hardcoded secrets, PII, and sensitive credentials in logs or configs.