01Optimization of concurrency and timeout limits to prevent resource exhaustion attacks.
02Identification of sensitive credentials stored in plaintext environment variables.
03Injection detection for untrusted event data used in SQL, shell commands, or file paths.
04Analysis of insecure /tmp directory data persistence between warm invocations.
056 GitHub stars
06Comprehensive IAM policy auditing to eliminate overprivileged 'Resource: *' permissions.