Security Policy Report vulnerabilities in hash chain integrity, signature verification, or redaction preservation responsibly.