This repository contains Cursor Security Rules designed to improve the security of both development workflows and AI agent usage within the Cursor environment. These rules aim to enforce safe coding practices, control sensitive operations, and reduce risk in AI-assisted development.
☆369Aug 27, 2025Updated 7 months ago
Alternatives and similar repositories for cursor-security-rules
Users that are interested in cursor-security-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tokenex is a Go library that securely exchanges identity tokens for temporary cloud credentials, with built-in support for AWS, GCP, Azur…☆78Apr 8, 2026Updated last week
- NVD API 2.0 client for CVE information☆13May 15, 2025Updated 10 months ago
- ☆20Apr 10, 2025Updated last year
- MCP Server connects with claude code local command.☆33Mar 6, 2026Updated last month
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆139Jun 7, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- A library of rules for the Cursor IDE, providing organized instructions for the Agent Composer LLM backend.☆65Dec 30, 2025Updated 3 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 7 months ago
- ☆72Oct 24, 2025Updated 5 months ago
- source code for the offsecml framework☆44Jun 6, 2024Updated last year
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆125Dec 14, 2025Updated 4 months ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated last year
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Mar 17, 2026Updated 3 weeks ago
- ☆40Aug 2, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 26, 2026Updated 2 weeks ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Streamable HTTP based MCP server and Client demo with auto registry, Dockerfile setup and env.☆19May 30, 2025Updated 10 months ago
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- AI-Powered Web Attack Surface Enumeration☆35Feb 5, 2026Updated 2 months ago
- ☆18Feb 2, 2026Updated 2 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆41Dec 12, 2024Updated last year
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆24Apr 4, 2026Updated last week
- Open-source EDR for AI agents. Monitor processes, files, network, and behavior of autonomous AI agents.☆119Mar 18, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Feb 9, 2025Updated last year
- If these strings are in your code, you might have a problem!☆51Feb 13, 2026Updated 2 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆122Jan 30, 2026Updated 2 months ago
- Transform Claude Code transcript JSONL files into readable terminal and HTML formats.☆74Feb 10, 2026Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆51Mar 10, 2025Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 7 months ago
- Replace chaotic AI code generation with a disciplined, spec-driven workflow. SDD Pilot enforces structured development phases and quality…☆60Updated this week
- ☆395Apr 7, 2026Updated last week
- Useful scripts for maintaining multiple AWS Accounts☆45Dec 1, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A research project to add some brrrrrr to Burp☆208Feb 16, 2026Updated last month
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Updated this week
- ☆27Aug 6, 2025Updated 8 months ago
- FrogPost: postMessage Security Testing Tool☆108Dec 4, 2025Updated 4 months ago
- Hunt Smarter, Hunt Harder☆191Mar 14, 2026Updated last month
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last month
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 10 months ago