Latest version: v1.5.7
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Transforms abstract static analysis results into intermediate representations that are often used to suggest a decomposition of a monolithic application into microservices.
No known vulnerabilities found