API Hardening
A high-signal rule set for securing APIs under real traffic: validation, auth boundaries, secrets handling, and operational safeguards.
Top Rules to Start With
- Security Cursor Rules — cursor · security
- Generic Security Rules for Google Gemini — gemini · go
- Security Claude Rules — claude · security
- Generic Security Rules for Amazon Q Developer — amazon-q · general
- Generic Security Rules for Bolt.new — bolt · general
- Generic Security Rules for Codeium — codeium · general
- Generic Security Rules for JetBrains AI Assistant — jetbrains-ai · general
- Generic Security Rules for Lovable — lovable · general
96 quality-ranked rules
All collections →Laravel Security Rules for Continue
SEO-ready Continue rules for Laravel security with copy-paste instructions, testing guardrails, and production-safe patterns.
Neon Postgres Security Rules for Zed
SEO-ready Zed rules for Neon Postgres security with copy-paste instructions, testing guardrails, and production-safe patterns.
Next.js Cursor Rules
Cursor rules for Next.js App Router: server components, data fetching, routing, and deployment best practices.
Spring Boot Security Rules for Aider
SEO-ready Aider rules for Spring Boot security with copy-paste instructions, testing guardrails, and production-safe patterns.
Spring Boot Security Rules for Claude Code
SEO-ready Claude Code rules for Spring Boot security with copy-paste instructions, testing guardrails, and production-safe patterns.
Spring Boot Security Rules for Cline
SEO-ready Cline rules for Spring Boot security with copy-paste instructions, testing guardrails, and production-safe patterns.
Spring Boot Security Rules for Continue
SEO-ready Continue rules for Spring Boot security with copy-paste instructions, testing guardrails, and production-safe patterns.
SwiftUI Security Rules for Aider
SEO-ready Aider rules for SwiftUI security with copy-paste instructions, testing guardrails, and production-safe patterns.
SwiftUI Security Rules for Claude Code
SEO-ready Claude Code rules for SwiftUI security with copy-paste instructions, testing guardrails, and production-safe patterns.
SwiftUI Security Rules for Cline
SEO-ready Cline rules for SwiftUI security with copy-paste instructions, testing guardrails, and production-safe patterns.
SwiftUI Security Rules for Continue
SEO-ready Continue rules for SwiftUI security with copy-paste instructions, testing guardrails, and production-safe patterns.
Terraform Security Rules for Aider
SEO-ready Aider rules for Terraform security with copy-paste instructions, testing guardrails, and production-safe patterns.
Terraform Security Rules for Claude Code
SEO-ready Claude Code rules for Terraform security with copy-paste instructions, testing guardrails, and production-safe patterns.
Terraform Security Rules for Cline
SEO-ready Cline rules for Terraform security with copy-paste instructions, testing guardrails, and production-safe patterns.
Terraform Security Rules for Continue
SEO-ready Continue rules for Terraform security with copy-paste instructions, testing guardrails, and production-safe patterns.
Security Aider Conventions
Aider conventions for security: secure coding patterns, vulnerability prevention, and security review checklist.
Solidity Security Rules for Claude Code
SEO-ready Claude Code rules for Solidity security with copy-paste instructions, testing guardrails, and production-safe patterns.
Solidity Security Rules for Continue
SEO-ready Continue rules for Solidity security with copy-paste instructions, testing guardrails, and production-safe patterns.
Django Cursor Rules
Cursor rules for Django: security settings, ORM best practices, performance patterns, and production Django configuration.
Docker Cursor Rules
Cursor rules for Docker: multi-stage builds, security hardening, layer optimization, and production-ready Dockerfile conventions.
Laravel (TALL Stack) Rules
You are an expert in the TALL stack: Laravel, Livewire, Alpine.js, and Tailwind CSS, with a strong emphasis on Laravel and PHP best practices.
GraphQL Cursor Rules
Cursor rules for GraphQL: schema design, resolver patterns, DataLoader, and security best practices.
Express.js Cursor Rules
Cursor rules for Express.js: middleware patterns, error handling, security, and production Node.js API best practices.
Kubernetes Cursor Rules
Cursor rules for Kubernetes: resource limits, security contexts, RBAC, and production-ready manifest conventions.