- • Replace with real entry points and user surfaces
- • Note how traffic enters the system
- • Include protocols when they matter
- • Summarize the primary services and execution path
- • Mention important queues, workers, or orchestration
- • Keep the bullets high signal and short
- • Call out storage, auth, and trust boundaries
- • Mention persistence or state ownership
- • Note the most important security controls