$ audit --target protocol.sol
[READ] Mapping trust boundaries ........ done
[READ] Tracing value flows .............. done
[HUNT] Checking state transitions ...... 3 suspicious
[HUNT] Verifying access controls ....... 1 suspicious
[PROVE] Tracing with concrete values .... 2 confirmed
[GATE] Kill checklist applied ........... 2 survived
═══════════════════════════════════════
FINDINGS: 2 High
KILLED: 2 candidates (out of scope, by design)
STATUS: READY FOR SUBMISSION
═══════════════════════════════════════