# rtl-flip-detect
[](https://crates.io/crates/rtl-flip-detect)
Detect bidi-control characters (U+202A–U+202E, U+2066–U+2069) that flip
rendered direction. Catches `evil\u{202E}cod.exe` filename-spoof and
similar tricks inside LLM tool args.
```rust
use rtl_flip_detect::{has_rtl_flip, strip_rtl_flips};
let s = "evil\u{202E}cod.exe";
assert!(has_rtl_flip(s));
assert_eq!(strip_rtl_flips(s), "evilcod.exe");
```
Zero deps. MIT or Apache-2.0.