01False positive filtering to ensure only legitimate security risks are reported
02Detailed CVSS 3.1 scoring to provide standardized severity assessments for all findings
030 GitHub stars
04Control flow analysis to detect existing sanitization, encoding, or framework-level protections
05Automated proof-of-concept (PoC) exploit generation for confirmed vulnerabilities
06Reachability analysis to trace entry points and call chains from external input to vulnerable sinks