<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Hugo Damion</title>
    <description>The latest articles on DEV Community by Hugo Damion (@logipek).</description>
    <link>https://dev.to/logipek</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3846734%2F380e9536-9582-4862-b585-7f9321eb99b7.jpeg</url>
      <title>DEV Community: Hugo Damion</title>
      <link>https://dev.to/logipek</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/logipek"/>
    <language>en</language>
    <item>
      <title>I was worried about the lack of security in shared .cursorrules, so I built a static analyzer to audit them.</title>
      <dc:creator>Hugo Damion</dc:creator>
      <pubDate>Fri, 27 Mar 2026 21:37:28 +0000</pubDate>
      <link>https://dev.to/logipek/i-was-worried-about-the-lack-of-security-in-shared-cursorrules-so-i-built-a-static-analyzer-to-4onn</link>
      <guid>https://dev.to/logipek/i-was-worried-about-the-lack-of-security-in-shared-cursorrules-so-i-built-a-static-analyzer-to-4onn</guid>
      <description>&lt;p&gt;Hey everyone,&lt;/p&gt;

&lt;p&gt;I’ve been using Cursor heavily lately, and like many of you, I’ve been grabbing .cursorrules and AI scripts from GitHub and various "libraries" to boost my productivity.&lt;/p&gt;

&lt;p&gt;But it started feeling like a security black box. We’re essentially running untrusted, 3rd-party instructions with full access to our source code, terminal, and .env files.&lt;/p&gt;

&lt;p&gt;I decided to build a small tool called AgentFend to solve this for myself. It uses a static analysis engine I’m calling Onyx to scan prompts and scripts before you hit "Enter".&lt;/p&gt;

&lt;p&gt;What it actually looks for right now:&lt;/p&gt;

&lt;p&gt;🚩 Data Exfiltration: Detecting if a prompt tries to send your code/keys to an external URL.&lt;/p&gt;

&lt;p&gt;🚨 Prompt Injections: Identifying instructions that try to override your agent's safety guardrails.&lt;/p&gt;

&lt;p&gt;🔑 Sensitive File Access: Flagging rules that shouldn't be touching your .aws or .ssh folders.&lt;/p&gt;

&lt;p&gt;It assigns a security score (0-100) and explains why a script might be sketchy.&lt;/p&gt;

&lt;p&gt;It’s 100% free and I don't store your code. I’m really looking for some technical feedback from this community:&lt;/p&gt;

&lt;p&gt;Is the "static analysis" approach enough, or should I look into runtime sandboxing?&lt;/p&gt;

&lt;p&gt;What other "red flags" should I add to the Onyx engine?&lt;/p&gt;

&lt;p&gt;Check it out here if you're interested: &lt;a href="https://agentfend.com/" rel="noopener noreferrer"&gt;https://agentfend.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hope this helps some of you stay safe while building!&lt;/p&gt;

</description>
      <category>cursor</category>
      <category>llm</category>
      <category>claudecode</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
