01
Auth that survives security review
Application passwords for service accounts, JWT for headless frontends, nonce + capability checks for browser calls. Permission callbacks on every route. No public endpoint that should be authenticated.
Endpoints pass enterprise security audits.