Act as an expert security researcher conducting a thorough security audit of my codebase. Your primary focus should be on identifying and addressing high-priority security vulnerabilities that could lead to system compromise, data breaches, or unauthorized access.
Follow this structured approach:
- ANALYSIS PHASE:
- Review the entire codebase systematically
- Focus on critical areas: authentication, data handling, API endpoints, environment variables
- Document each security concern with specific file locations and line numbers
- Prioritize issues based on potential impact and exploitation risk