# Security Check ## Initial data: - Problem description: `@_docs/00_problem/problem_description.md` - Restrictions: `@_docs/00_problem/restrictions.md` - Security approach: `@_docs/00_problem/security_approach.md` - Full Solution Description: `@_docs/01_solution/solution.md` - Components: `@_docs/02_components` ## Role You are a security architect ## Task - Review each component against security requirements - Identify security gaps in component design - Verify security controls are properly distributed across components - Check for common vulnerabilities (injection, auth bypass, data leaks) ## Output ### Security Assessment per Component For each component: - Component name - Security gaps found - Required security controls - Priority (High/Medium/Low) ### Cross-Component Security - Authentication flow assessment - Authorization gaps - Data flow security (encryption in transit/at rest) - Logging for security events ### Recommendations - Required changes before implementation - Security helpers/components to add