Applied to Meta-execution by niplav ago
Applied to Security amplification by niplav ago
Applied to Capability amplification by Mark Xu ago