<aside> 📘
This document is the result of the dedicated work carried out by Team 4 during TMC’s Threat Modeling Hackathon 2025. We’ve chosen to publish our primary deliverable with the broader community as a way to share knowledge, promote collaboration, and contribute to the continued evolution of threat modeling practices.
For additional context, feel free to check out the hackathon’s challenge prompt: Participants Guide.
</aside>
System Context & Technical Overview
If you wanna jump directly into the core of the deliverable, then visit Threats & Mitigations.