<aside> 📘

This document is the result of the dedicated work carried out by Team 4 during TMC’s Threat Modeling Hackathon 2025. We’ve chosen to publish our primary deliverable with the broader community as a way to share knowledge, promote collaboration, and contribute to the continued evolution of threat modeling practices.

For additional context, feel free to check out the hackathon’s challenge prompt: Participants Guide.

</aside>

Executive Summary

System Context & Technical Overview

Threat Model

Acknowledgements

If you wanna jump directly into the core of the deliverable, then visit Threats & Mitigations.