🔑Secret DetectionCatch hardcoded passwords, API keys, tokens, private keys, and high-entropy strings before they reach production.
🛡️Exploit PatternsDetect SQL injection, XSS, command injection, path traversal, deserialization, prototype pollution, and 20+ more vulnerability patterns.
🔐Cryptography AuditsFlag weak algorithms (MD5, SHA1, DES, RC4, ECB mode), insecure random, hardcoded IVs, and missing TLS verification.
🌐Unicode AttacksIdentify Trojan Source (CVE-2021-42574) bidirectional control characters and homoglyph substitutions.
⚙️Fully ConfigurableTOML config file, per-file/line/rule suppression, severity overrides, custom JSON rules, glob excludes, and more.
⚡Blazing FastParallel file scanning with Rayon, gitignore-aware traversal, and compiled regex patterns. Scans millions of lines in seconds.