Threat model, data-flow diagrams, and control matrix.
Scan the product manifest — ontology types, functions, actions, policies, and dataset shells.