V1. Architecture, design and threat modelling
V2. Data storage and privacy
V3. Cryptography verification
V4. Authentication and session management
V5. Network communication
V6. Interaction with the environment
V7. Code quality and build setting
V8. Resiliency against reverse engineering