Security

Threat models and permissioning checklists to reduce abuse and data leakage risk.