Trust-boundary comparison between user authority and infrastructure dependence.
Move from the single artifact back to the surrounding proof surface, dossier, and writing trail.