Downloadable computer software for detecting, analyzing, and reporting insecure, weak, or known cryptographic keys and secrets used in computer programs, applications, and web frameworks, for cybersecurity, security assessment, and software auditing purposes; Downloadable cybersecurity software, computer programs, and software applications for detecting and identifying sensitive information hidden in digital files and code; Software for use in scanning files and repositories and reporting on security risks and vulnerabilities; Downloadable software for others for use in risk mitigation and data protection; Downloadable computer software libraries for detecting and identifying exposed authentication credentials and cryptographic material in software and web applications
Electrical and Scientific Apparatus