01Automated identification of edge-case implementation errors
02Integration with variant analysis and security audit workflows
03Detection of known vulnerabilities in RSA, Elliptic Curve, and AES
04Security-focused guidance based on Trail of Bits best practices
05Access to Google's Wycheproof test vectors for cryptographic validation
062 GitHub stars