Review steps
- Capture the server URL, registry source, maintainer, and package reference.
- Score tool impact and identify high-risk or irreversible actions.
- Document authentication gaps and data exposure paths.
- Export a packet with findings, recommended policy, and approval record.