Problem Statement
You have multiple medium findings. Which one should you try to chain first for highest impact?
Explanation
Identity is a force multiplier. If a bug lets you act as another user or role, it can unlock panels, endpoints, and data that amplify impact. Start where access level jumps, then chain to sensitive actions.
Code Solution
SolutionRead Only
Priority: auth bypass → admin → sensitive actions → data impact
