Snyk Code has developed and released rules to address Trojan Source attacks, a new type of potential vulnerability that can be hidden in plain sight within code using unicode characters. The attack can make code appear as if it contains valid authentication logic or comments that are ignored at runtime, allowing attackers to execute malicious actions. Snyk Code's agile development process allowed them to add the rules for Trojan Source and related vulnerabilities within 10 days, demonstrating their ability to respond quickly to emerging threats. The tool now scans for Trojan Source type of issues in codebases, detecting a larger set of problems than most other tools, including confusable UTF characters used in method and variable names that can potentially hide true semantics. Snyk Code's unique engine learns from the global developer community using a human-guided algorithm and provides an industry-leading accuracy in identifying vulnerabilities, making it a powerful tool for securing codebases.