01Detects exposed API keys and sensitive credentials in configuration files
02Audits system settings for compliance with security best practices
03Provides actionable remediation recommendations for identified vulnerabilities
043 GitHub stars
05Identifies insecure application defaults and missing security headers
06Analyzes Infrastructure-as-Code (IaC) files like Terraform and CloudFormation