drop firmware binary · detect known hardware trojan signatures · runs locally
drop firmware binary · local only
heuristic screener · vendor schema varies · not definitive proof