Systematic security audit walkthrough: input validation, authn/authz, secrets handling, dependency CVEs, OWASP Top 10 alignment.