Security Checklist (What can be done in CursorAI & software-level not infrastructure!) Configuration Security Detect secrets in code Identify secrets committed to version control Flag hardcoded credentials Authentication & Authorization Identify missing authentication checks Detect improper authorization patterns