01Deep IAM policy analysis and service account impersonation risk detection
02Standardized markdown audit report generation with severity-ranked findings
03Automated flagging of excessive roles based on environment tags
040 GitHub stars
05Comprehensive asset inventory scanning across all GCP resource types
06Network security review including firewall rules and VPC exposure