Solved🟢SQLanon and authenticated roles, they include things like TRUNCATE, TRIGGER, and REFERENCES across schemas like storage, supabase_functions, public, etc. My understanding is that RLS doesn't protect against TRUNCATE or TRIGGER abuse, so these feel indefensible regardless of RLS policies. Does this constitute a security vulnerability, or is there a mitigation I'm missing?CWE-732, but wanted to ask beforehand to spare myself the embarrassment since I've never actually posted there.