`safe` modular architecture

After spending some time thinking about the list, “Auth management for user authentication. (installing from private addresses)” is not strictly necessary, as with node and subcommand management, auth management could be installed using a read-only Safe connection.