Skip to content

This repository contains Cursor Security Rules designed to improve the security of both development workflows and AI agent usage within the Cursor environment. These rules aim to enforce safe coding practices, control sensitive operations, and reduce risk in AI-assisted development.

License

Notifications You must be signed in to change notification settings

matank001/cursor-security-rules

Repository files navigation

๐Ÿ›ก๏ธ Cursor Security Rules

This repo provides essential security rules for Cursor.

โš ๏ธ Why do you need these rules?

By default, Cursor can generate unsafe codeโ€”such as exposing secrets or running dangerous commands. These rules act as guardrails to help you avoid risky patterns and enforce best practices automatically.

These rules aim to enforce safe coding practices, control sensitive operations, and reduce risk in AI-assisted development.

๐Ÿš€ How to Use These Rules

โœจ Simply add these rules to your .cursor/rules directory (or your main directory) and you'll instantly be safer.

๐Ÿ“‹ Example Rule Topics

  • ๐Ÿ”’ Secure Development Principles
  • ๐Ÿค– Secure MCP Usage
  • ๐Ÿ Python Security Best Practices
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธ No Secrets in Frontend
  • ๐Ÿšซ No Unsafe System Commands

๐Ÿ’ก Why Use Cursor Security Rules?

  • โœ… Enforce safe coding practices
  • ๐Ÿ›‘ Prevent accidental exposure of secrets
  • ๐Ÿ‘ฎโ€โ™‚๏ธ Control sensitive operations
  • ๐Ÿค Foster a security-first development culture

๐Ÿค Contribute

Are you a security researcher or developer passionate about AI safety? If you have ideas to improve these rules or want to add new ones, we encourage you to contribute! Your expertise can help make AI-assisted development safer for everyone ๐Ÿ“

๐Ÿ‘ฅ About Us

We are Matan Kotick and Amit Ziv, security researchers specializing in the field of AI Agents.

Contact us if you have any questions about this interesting topic!

About

This repository contains Cursor Security Rules designed to improve the security of both development workflows and AI agent usage within the Cursor environment. These rules aim to enforce safe coding practices, control sensitive operations, and reduce risk in AI-assisted development.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •