Threat models and permissioning checklists to reduce abuse and data leakage risk.
Reference artifact for security.