* Extract authorization from commands * Swap to request model validation. * Swap to pattern detection