What cybersecurity tools does Zig need?

Zig has amazing potential for security research and testing libraries, but the ecosystem is pretty bare right now. I’ve been working on a fuzzing library for legitimate security testing and penetration research, and I want to know what the community needs. The fuzzing library will handle protocol testing, file format validation, memory safety checking, and automated vulnerability discovery - basically AFL-style fuzzing built for Zig’s performance and safety features. But there’s so much more we could build: network security scanner libraries, cryptography libraries, log analysis libraries, digital forensics libraries, and penetration testing libraries. Zig’s perfect for this stuff - C-level performance, memory safety to prevent bugs in the tools themselves, cross-compilation for any target, and easy interop with existing security infrastructure. What security tools would you use in your projects? What’s missing that you’d love to have in Zig? I want to build stuff people will use, not just toy projects. Drop your thoughts on what fuzzing features matter most, what other security libraries would be valuable, or any specific protocols you need tested.