01Analyzes complex patterns including reentrancy, access control, and MEV risks
02Verifies environmental preconditions and state requirements for exploitability
0310 GitHub stars
04Step-by-step attack path tracing and logical verification
05Provides standardized verdicts with evidence-backed code references
06Cross-references READMEs and known-issue logs to eliminate false positives