Paste certificate data, PEM blocks, or scan output. AI-powered analysis detects vulnerabilities, compliance gaps, and expiry risks.