Scan source code for common vulnerabilities (SQLi, XSS, IDOR, JWT issues, etc.)
Upload a source file (.rb, .js, .py, .php, .java) or ZIP archive