Cursor Rules Secure by Default
Cursor rules for secure-by-default development — input validation, output encoding, authentication patterns, and common vulnerability prevention
Security general Cursor Rules
Details
How to install in Cursor
Manual steps
- Download or copy the rules file from the source repository.
- Add it to your project root as
.cursorrules. - Restart Cursor — the rules will be active for all AI interactions in this project.