Disproven Hypotheses

Equally valuable as confirmed bugs — saves future investigators time.

H1: SQL injection via (str "UPDATE tenant SET ") in admin/http/tenants.clj:711

H2: SQL injection via INTERVAL '" days " days' in admin/db/queries.clj

H3: SQL injection via [:raw (str "interval '" stale-running-seconds " seconds'")] in workers/document_output.clj:53

H4: JWT algorithm confusion attack in app/http/middleware/auth.clj:247

H5: Document presigned URL bypass via altered :document/file-path

H6: wrap-audit-log async-only middleware breaking sync routes (link/api)

H7: Multi-membership tenant isolation bug in authenticate (auth.clj:111-116)

H8: ExceptionInfo-only catch in oauth.clj sync handler (line 213)

H9: Engine bump-completed-runs-to-version! race (engine.clj:392-397)

H10: Maesn background DATEV polling silent failure (maesn.clj:638-648)