Source handlingChoose hosted or local workflow based on project policy.
Release validationUse release-check, smoke tests, exclusions, and protected-build review.
Layered scopeHow obfuscation fits alongside runtime monitoring, VM bytecode, and server-side authority.