Using Z3 theorem prover to analyze role-based access permissions | Dark Hacker News