Audit code and architecture for exploitable vulnerabilities, privacy risks, and insecure defaults. Use when the user asks for security review, threat modeling, hardening, or compliance checks.
When performing a security audit:
Use this exact structure:
## Findings
- [Severity] Title
- Attack scenario:
- Impact:
- Where:
- Remediation:
## Threat Model Notes
- ...
## Hardening Checklist
- ...
## Residual Risk Summary
- ...
Critical: directly exploitable with severe impact.High: realistic exploitation path with major impact.Medium: meaningful weakness with constrained exploitability.Low: hardening recommendation with low immediate risk.