- Detect secrets in code
- Identify secrets committed to version control
- Flag hardcoded credentials
- Identify missing authentication checks
- Detect improper authorization patterns
| @layer base { | |
| :root { | |
| --flexoki-bg: 48 100% 97%; | |
| --flexoki-bg-2: 51 33% 92%; | |
| --flexoki-ui: 51 21% 88%; | |
| --flexoki-ui-2: 50 14% 83%; | |
| --flexoki-ui-3: 55 10% 79%; | |
| --flexoki-tx: 0 3% 6%; |
| // Tailwind colors for Flexoki theme by Steph Ango. https://stephango.com/flexoki | |
| const colors = { | |
| base: { | |
| black: '#100F0F', | |
| 950: '#1C1B1A', | |
| 900: '#282726', | |
| 850: '#343331', | |
| 800: '#403E3C', | |
| 700: '#575653', |