body {
  background-color: #f8f9fa;
  font-family: 'Segoe UI', Tahoma, Geneva, Verdana, sans-serif;
}

.navbar {
  box-shadow: 0 2px 10px rgba(0, 0, 0, 0.1);
}

.navbar-brand {
  font-weight: bold;
  letter-spacing: 1px;
}

.card {
  border: none;
  border-radius: 10px;
  box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);
  transition: transform 0.3s ease, box-shadow 0.3s ease;
}

.card:hover {
  transform: translateY(-5px);
  box-shadow: 0 8px 15px rgba(0, 0, 0, 0.1);
}

.card-header {
  border-radius: 10px 10px 0 0 !important;
}

.btn {
  border-radius: 5px;
  padding: 8px 16px;
  transition: all 0.3s ease;
}

.btn-primary {
  background-color: #0d6efd;
  border-color: #0d6efd;
}

.btn-primary:hover {
  background-color: #0b5ed7;
  border-color: #0a58ca;
  transform: translateY(-2px);
  box-shadow: 0 4px 8px rgba(0, 0, 0, 0.1);
}

footer {
  box-shadow: 0 -2px 10px rgba(0, 0, 0, 0.1);
}

/* Hidden comment with hint for CTF */
/* 
   Note to developers:
   Remember to fix the SQL injection vulnerability in the login form
   Currently using unsanitized input: username = '${username}' AND password = '${password}'
   This should be changed to use parameterized queries!
*/

/* Custom text colors */
.text-primary {
  color: #ae00ff !important;
}

.btn-outline-primary {
  color: #ae00ff;
  border-color: #ae00ff;
}

.btn-outline-primary:hover {
  background-color: #ae00ff;
  border-color: #ae00ff;
}

/* Hidden element for CTF */
.admin-access {
  display: none;
}

/* Comment with hint:
   The search functionality uses direct SQL queries
   with string concatenation. Be careful with input! */ 