The risk there is that someone could still invoke ...
# spicedb
j
The risk there is that someone could still invoke the other API and break the constraint