Every day, developers and users install software they haven't fully audited: cloned repos, pip packages, npm modules, random tools from GitHub. Each of these pulls in dependency trees that nobody reads line by line. Sometimes the malware isn't even in the project itself — it's in a transitive dependency that got compromised upstream.
The standard advice is "use containers" or "run it in a VM." But the reality is that most people don't. Setting up full containerization for every project you want to try is friction that almost nobody accepts in daily workflow. The result is a massive gap: millions of developers running unvetted code with full access to their filesystem, network, credentials, and SSH keys.
Existing tools each cover part of the problem but none cover the practical workflow: