Review the changes from a security perspective. Check for the following vulnerabilities: - Injection attacks (SQL, command, XSS) - Authentication and authorization flaws - Data exposure risks - Cryptographic weaknesses **Design decisions reference:** Review {report:coder-decisions.md} to understand the recorded design decisions. - Do not flag intentionally documented decisions as FP - However, also evaluate whether the design decisions themselves are sound, and flag any problems ## Judgment Procedure 1. Review the change diff and detect issues based on the security criteria above - Cross-check changes against REJECT criteria tables defined in knowledge 2. For each detected issue, classify as blocking/non-blocking based on Policy's scope determination table and judgment rules 3. If there is even one blocking issue, judge as REJECT