Adding a protected endpoint on top of an unmapped auth implementation risks mismatched token validation, broken access rules, or bypassed middleware. Reading through the codebase manually to map the full flow leaves gaps. Ask traces the full authentication flow through the knowledge graph, from incoming request to token validation to access enforcement, and returns every file involved with exact line ranges. Question:Documentation Index
Fetch the complete documentation index at: https://docs.potpie.ai/llms.txt
Use this file to discover all available pages before exploring further.
- The middleware that intercepts and validates incoming tokens
- The auth service and its dependencies
- How protected routes enforce access rules
- Token validation middleware with exact file paths and line ranges
- Auth service implementation and every file it depends on
- Every protected route and the access rules applied to each

