Reachability analysis grounded in exploitability
Direct and transitive dependency tracing demotes findings in unreachable code paths. The backlog reflects what attackers can reach rather than every vulnerable line. On portfolios with deep dependency trees the difference is meaningful.