1. Scope lock
Validate target, asset ownership, and exclusions before any run starts.
Use case
Confirm whether an issue is real, in scope, and still reproducible without wasting cycles. This flow keeps authorization checks, role boundaries, and evidence quality first.
Validate target, asset ownership, and exclusions before any run starts.
Replay the reporter path and capture browser/network artifacts automatically.
Run auth boundary checks across identities for quick IDOR/authz signal.
Need the longer playbook with scope, reproduction, and role-comparison guidance?