Structured checklist for protocol review: assets, trust boundaries, invariant mapping, attack simulations, and report standards.