|  | # Changes to integration with the Fuchsia platform, or peer components, require | 
|  | # security review to avoid introducing sandbox escapes. These include: | 
|  | # - Critical platform integrations (e.g. shared memory, process launching). | 
|  | # - Changes to Chromium-defined Fuchsia IPC (aka FIDL) protocols. | 
|  | # - Addition of new FIDL services to child process sandboxes. | 
|  | # - Addition of new FIDL clients and implementations. | 
|  | # | 
|  | # Security team: If you are uncomfortable reviewing a particular bit of code | 
|  | # yourself, don't hesitate to seek help from another security team member! | 
|  | # Nobody knows everything, and the only way to learn is from experience. | 
|  |  | 
|  | # Please keep reviewers ordered alphabetically by LDAP. | 
|  | ajgo@chromium.org | 
|  | rsesek@chromium.org | 
|  | tsepez@chromium.org | 
|  | wez@chromium.org |