Security Policy Report security vulnerabilities privately to the maintainers. Threat model priorities Prevent accidental writes to non-removable/system disks. Fail closed when policy checks or verification cannot be completed. Keep local IPC authenticated and least-privileged.