- The middleware that intercepts and validates incoming tokens
- The auth service and its dependencies
- How protected routes enforce access rules
- Token validation middleware with exact file paths and line ranges
- Auth service implementation and every file it depends on
- Every protected route and the access rules applied to each

