Use when performing a security review before deployment, auditing code for common vulnerabilities, or validating that security controls are in place. Run a structured security review covering secrets, input validation, injection, authentication, XSS, CSRF, rate limiting, data exposure, and dependency scanning.