This reviewer's identity has been verified by our review moderation team. They have asked not to show their name, job title, or picture.
Scans are thorough, easily distributed. Branding. Perceived integration. Review collected by and hosted on G2.com.
Returns many false positives - for example identifies any variable with the name 'key' as a stored encryption key violation. Doesn't understand the context of code, or entry points for an exploit. Cumbersome in execution (will monopolize a machine's resources while running). Review collected by and hosted on G2.com.
Validated through LinkedIn
Organic review. This review was written entirely without invitation or incentive from G2, a seller, or an affiliate.





