Foundation breachA gap in a critical production system — auth, billing, admin, or environment configuration — that creates immediate risk.Unsafe auth pathA code path where authentication or authorization is missing, bypassed, or performed only on the client side.Unsafe billing pathA code path where payment processing can be tampered, bypassed, or fulfilled without verified webhook confirmation.Permission gapA missing ownership check, role verification, or Row Level Security policy that allows unauthorized data access.Unverified webhookA webhook handler that processes events without verifying the signature — allowing forged events to trigger real business actions.Secret exposureA secret key (API key, service_role key, Stripe key) present in client-side code or committed to version control.RLSRow Level Security — Supabase/PostgreSQL feature that restricts which rows a user can read or write. Missing RLS can allow authenticated users to access rows they should not access.