| Frontend-backend authorization parity | High | UI constraints can mask missing server enforcement. | Bypass UI and call backend endpoints directly to validate hard controls. |
| Data validation and integrity | High | Generated forms can omit robust validation paths. | Test malformed inputs and confirm consistent backend rejection behavior. |
| PII and telemetry hygiene | Medium | Instrumentation can leak sensitive context in logs/trackers. | Inspect telemetry payloads for personal or secret-bearing fields. |
| Release readiness | Low | Design-speed workflows can skip backend risk checks. | Ensure release checklist includes backend and data-risk signoff. |