+For example, a rule focused on input validation could work at multiple stages. It might suggest secure input handling patterns during code generation, flag potentially unsafe user or AI agent input processing in real-time, and then validate that proper sanitization and validation logic is present in the final code. Another rule targeting secret management could prevent hardcoded credentials from being generated, alert developers when sensitive data patterns are detected, and verify that secrets are properly externalized using secure configuration management.
0 commit comments