Analyze Cross-Origin Resource Sharing configurations for security issues
Check for wildcard, null, and reflected origin configurations
Detect unsafe credential configurations and cache issues
Analyze allowed methods and exposed headers for risks