Skip to main content

Secure Coding Guardrails

Mandatory Guardrails

  • Enforce input validation for all external inputs.
  • Require explicit authN/authZ checks before business logic.
  • Block use of hardcoded secrets or tokens.
  • Require parameterized queries for data access.
  • Require structured error handling that avoids sensitive leakage.

PR Security Checklist

  • Input validation present and tested
  • Authentication and authorization paths covered
  • No insecure cryptographic defaults
  • No secrets in code, logs, or tests
  • Security scan status is passing

Escalation Triggers

Escalate to the security lead when:

  • Critical vulnerabilities are found
  • A dependency has an actively exploited CVE
  • AI-generated code bypasses existing security middleware