§ url
url.
Parse a URL and inspect the parts. Beyond the standard split into protocol/host/path/query, surfaces things real-world phishing relies on: IDN homograph candidates, RTL bidi overrides, NULL bytes, double-encoded percent escapes, userinfo tricks, IP literals dressed up as domains.
- parsing
- uses the platform
URLconstructor — same parser the browser navigates with. inputs without a scheme are retried withhttp://prepended. - flags
- severity is opinionated. high = obvious red flag a phisher would use. medium = unusual but legitimate uses exist. low = informational.