Security Engineer signal: topological sort + cycle detection in a threat intel graph context. This is a ProdMatch-owned security engineer drill, framed as a March 2026 Zomato Security Platform simulation, not a copied platform question.
Company context
Zomato · Security Platform
Freshness
March 2026
Product surface
threat intel graph
ProdMatch interview simulation based on product-team patterns; not a claim of a real company question.
You own threat intel graph for a Security Engineer loop. Given indicators and directed dependencies between them, return a valid execution order. If a cycle exists, return an empty list and identify that the rollout is blocked.
Input
Output
Constraints
Concepts
indicators: 4, deps: [[0,1],[0,2],[2,3]] -> [0,1,2,3] or [0,2,1,3]
Try framing your own approach first. The 30 seconds you think before peeking is where learning happens.
Reveal the approach first.
Your rating tunes when this problem shows up again.