- Detect secrets in code
- Identify secrets committed to version control
- Flag hardcoded credentials
- Identify missing authentication checks
- Detect improper authorization patterns
@layer base { | |
:root { | |
--flexoki-bg: 48 100% 97%; | |
--flexoki-bg-2: 51 33% 92%; | |
--flexoki-ui: 51 21% 88%; | |
--flexoki-ui-2: 50 14% 83%; | |
--flexoki-ui-3: 55 10% 79%; | |
--flexoki-tx: 0 3% 6%; |
// Tailwind colors for Flexoki theme by Steph Ango. https://stephango.com/flexoki | |
const colors = { | |
base: { | |
black: '#100F0F', | |
950: '#1C1B1A', | |
900: '#282726', | |
850: '#343331', | |
800: '#403E3C', | |
700: '#575653', |