The view key_column_usage identifies all columns in the current database that are restricted by some unique, primary key, or foreign key constraint. Check constraints are not included in this view.
Another option is to verify yourself using a physical security key. Even if a cybercriminal has obtained your username and password or compromised your mobile device, they won't be able to ...