01Automated HIPAA violation detection in source code
02Detection of insecure data storage and encryption gaps
03Infrastructure-as-Code (IaC) configuration scanning
04Validation of access control policies and documentation
053 GitHub stars
06Detailed compliance reporting with remediation guidance