API Hardening

A high-signal rule set for securing APIs under real traffic: validation, auth boundaries, secrets handling, and operational safeguards.

Who this is for: Backend/API teams, platform engineers, and founders preparing for security reviews or enterprise customers.

Top Rules to Start With

  1. Security Cursor Rulescursor · security
  2. Generic Security Rules for Google Geminigemini · go
  3. Security Claude Rulesclaude · security
  4. Generic Security Rules for Amazon Q Developeramazon-q · general
  5. Generic Security Rules for Bolt.newbolt · general
  6. Generic Security Rules for Codeiumcodeium · general
  7. Generic Security Rules for JetBrains AI Assistantjetbrains-ai · general
  8. Generic Security Rules for Lovablelovable · general

96 quality-ranked rules

All collections →

Laravel Security Rules for Continue

ContinuePHP

SEO-ready Continue rules for Laravel security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
continue · phpCopy Ready

Neon Postgres Security Rules for Zed

Zed AITypeScript

SEO-ready Zed rules for Neon Postgres security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
zed · typescriptCopy Ready

Next.js Cursor Rules

CursorNext.js

Cursor rules for Next.js App Router: server components, data fetching, routing, and deployment best practices.

Architecture
nextjs · app-routerCopy Ready

Spring Boot Security Rules for Aider

AiderJava

SEO-ready Aider rules for Spring Boot security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
aider · javaCopy Ready

Spring Boot Security Rules for Claude Code

Claude CodeJava

SEO-ready Claude Code rules for Spring Boot security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
claude-code · javaCopy Ready

Spring Boot Security Rules for Cline

ClineJava

SEO-ready Cline rules for Spring Boot security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
cline · javaCopy Ready

Spring Boot Security Rules for Continue

ContinueJava

SEO-ready Continue rules for Spring Boot security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
continue · javaCopy Ready

SwiftUI Security Rules for Aider

AiderSwift

SEO-ready Aider rules for SwiftUI security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
aider · swiftCopy Ready

SwiftUI Security Rules for Claude Code

Claude CodeSwift

SEO-ready Claude Code rules for SwiftUI security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
claude-code · swiftCopy Ready

SwiftUI Security Rules for Cline

ClineSwift

SEO-ready Cline rules for SwiftUI security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
cline · swiftCopy Ready

SwiftUI Security Rules for Continue

ContinueSwift

SEO-ready Continue rules for SwiftUI security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
continue · swiftCopy Ready

Terraform Security Rules for Aider

Aiderhcl

SEO-ready Aider rules for Terraform security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
aider · hclCopy Ready

Terraform Security Rules for Claude Code

Claude Codehcl

SEO-ready Claude Code rules for Terraform security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
claude-code · hclCopy Ready

Terraform Security Rules for Cline

Clinehcl

SEO-ready Cline rules for Terraform security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
cline · hclCopy Ready

Terraform Security Rules for Continue

Continuehcl

SEO-ready Continue rules for Terraform security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
continue · hclCopy Ready

Security Aider Conventions

Aidersecurity

Aider conventions for security: secure coding patterns, vulnerability prevention, and security review checklist.

Security
security · aiderCopy Ready

Solidity Security Rules for Claude Code

Claude CodeSolidity

SEO-ready Claude Code rules for Solidity security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
claude-code · solidityCopy Ready

Solidity Security Rules for Continue

ContinueSolidity

SEO-ready Continue rules for Solidity security with copy-paste instructions, testing guardrails, and production-safe patterns.

Security
continue · solidityCopy Ready

Django Cursor Rules

CursorDjango

Cursor rules for Django: security settings, ORM best practices, performance patterns, and production Django configuration.

Security
django · pythonCopy Ready

Docker Cursor Rules

CursorDocker

Cursor rules for Docker: multi-stage builds, security hardening, layer optimization, and production-ready Dockerfile conventions.

Security
docker · containersCopy Ready

Laravel (TALL Stack) Rules

CursorLaravel

You are an expert in the TALL stack: Laravel, Livewire, Alpine.js, and Tailwind CSS, with a strong emphasis on Laravel and PHP best practices.

Security
cursor · laravelCopy Ready

GraphQL Cursor Rules

CursorGraphQL

Cursor rules for GraphQL: schema design, resolver patterns, DataLoader, and security best practices.

API Design
graphql · apiCopy Ready

Express.js Cursor Rules

CursorExpress

Cursor rules for Express.js: middleware patterns, error handling, security, and production Node.js API best practices.

API Design
express · nodejsCopy Ready

Kubernetes Cursor Rules

CursorKubernetes

Cursor rules for Kubernetes: resource limits, security contexts, RBAC, and production-ready manifest conventions.

Security
kubernetes · k8sCopy Ready
Showing 73-96 of 96
← PrevPage 3/3Next →