Skip to content

Commit e7ee93e

Browse files
authored
Merge pull request #72 from project-codeguard/feature/updating-docs-readme-nov-19
Feature/updating docs readme nov 19
2 parents 6674a57 + 33df721 commit e7ee93e

File tree

2 files changed

+29
-29
lines changed

2 files changed

+29
-29
lines changed

README.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,12 @@ This project is an AI model-agnostic security framework and ruleset (internally
1010

1111
AI coding agents are transforming software engineering, but this speed can introduce security vulnerabilities. Is your AI coding agent implementation introducing security vulnerabilities?
1212

13-
- Skipping input validation
14-
- Hardcoding secrets and credentials
15-
- Using weak cryptographic algorithms
16-
- Relying on unsafe functions
17-
- Missing authentication/authorization checks
18-
- Missing any other security best practice
13+
- Skipping input validation
14+
- Hardcoding secrets and credentials
15+
- Using weak cryptographic algorithms
16+
- Relying on unsafe functions
17+
- Missing authentication/authorization checks
18+
- Missing any other security best practice
1919

2020
Project CodeGuard solves this by embedding security best practices directly into AI coding agent workflows.
2121

@@ -31,14 +31,14 @@ Project CodeGuard is designed to integrate seamlessly across the entire AI codin
3131

3232
Our rules cover essential security domains:
3333

34-
- **🔐 Cryptography**: Safe algorithms (including post-quantum cryptography), secure key management, certificate validation
35-
- **🛡️ Input Validation**: SQL injection prevention, XSS protection, command injection defense
36-
- **🔑 Authentication**: MFA best practices, OAuth/OIDC, secure session management
37-
- **Authorization**: RBAC/ABAC, access control, IDOR prevention
38-
- **📦 Supply Chain**: Dependency security, SBOM generation, vulnerability management
39-
- **☁️ Cloud Security**: IaC hardening, container security, Kubernetes best practices
40-
- **📱 Platform Security**: Mobile apps, web services, API security
41-
- **🔍 Data Protection**: Privacy, encryption at rest/transit, secure storage
34+
- **Cryptography**: Safe algorithms (including post-quantum cryptography), secure key management, certificate validation
35+
- **Input Validation**: SQL injection prevention, XSS protection, command injection defense
36+
- **Authentication**: MFA best practices, OAuth/OIDC, secure session management
37+
- **Authorization**: RBAC/ABAC, access control, IDOR prevention
38+
- **Supply Chain**: Dependency security, SBOM generation, vulnerability management
39+
- **Cloud Security**: IaC hardening, container security, Kubernetes best practices
40+
- **Platform Security**: Mobile apps, web services, API security
41+
- **Data Protection**: Privacy, encryption at rest/transit, secure storage
4242

4343
## Quick Start
4444

@@ -97,4 +97,4 @@ This project uses dual licensing:
9797
This licensing approach ensures the security rules remain freely accessible and reusable while providing appropriate terms for software components.
9898

9999

100-
Copyright © 2025 Cisco Systems, Inc.
100+
Copyright © 2025 Cisco Systems, Inc.

docs/index.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@
66

77
AI coding agents are transforming software engineering, but this speed can introduce security vulnerabilities. Is your AI coding agent implementation introducing security vulnerabilities?
88

9-
- Skipping input validation
10-
- Hardcoding secrets and credentials
11-
- Using weak cryptographic algorithms
12-
- Relying on unsafe functions
13-
- Missing authentication/authorization checks
14-
- Missing any other security best practice
9+
- Skipping input validation
10+
- Hardcoding secrets and credentials
11+
- Using weak cryptographic algorithms
12+
- Relying on unsafe functions
13+
- Missing authentication/authorization checks
14+
- Missing any other security best practice
1515

1616
Project CodeGuard solves this by embedding security best practices directly into AI coding agent workflows.
1717

@@ -28,14 +28,14 @@ This multi-stage methodology ensures that security considerations are woven thro
2828

2929
Our rules cover essential security domains:
3030

31-
- **🔐 Cryptography**: Safe algorithms (including post-quantum cryptography), secure key management, certificate validation
32-
- **🛡️ Input Validation**: SQL injection prevention, XSS protection, command injection defense
33-
- **🔑 Authentication**: MFA best practices, OAuth/OIDC, secure session management
34-
- **Authorization**: RBAC/ABAC, access control, IDOR prevention
35-
- **📦 Supply Chain**: Dependency security, SBOM generation, vulnerability management
36-
- **☁️ Cloud Security**: IaC hardening, container security, Kubernetes best practices
37-
- **📱 Platform Security**: Mobile apps, web services, API security
38-
- **🔍 Data Protection**: Privacy, encryption at rest/transit, secure storage
31+
- **Cryptography**: Safe algorithms (including post-quantum cryptography), secure key management, certificate validation
32+
- **Input Validation**: SQL injection prevention, XSS protection, command injection defense
33+
- **Authentication**: MFA best practices, OAuth/OIDC, secure session management
34+
- **Authorization**: RBAC/ABAC, access control, IDOR prevention
35+
- **Supply Chain**: Dependency security, SBOM generation, vulnerability management
36+
- **Cloud Security**: IaC hardening, container security, Kubernetes best practices
37+
- **Platform Security**: Mobile apps, web services, API security
38+
- **Data Protection**: Privacy, encryption at rest/transit, secure storage
3939

4040
## Quick Start
4141

0 commit comments

Comments
 (0)