Skip to content

Commit f6bc8e0

Browse files
authored
Creating .github profile README.md
1 parent 9bedb84 commit f6bc8e0

1 file changed

Lines changed: 20 additions & 0 deletions

File tree

profile/README.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
# Project CodeGuard
2+
3+
[Project CodeGuard](https://github.com/project-codeguard/rules) is an open-source, model-agnostic security framework that embeds secure-by-default practices into AI coding agent workflows. It provides comprehensive security rules that guide AI assistants to generate more secure code automatically.
4+
5+
## Why Project CodeGuard?
6+
7+
AI coding agents are transforming software engineering, but this speed can introduce security vulnerabilities. Is your AI coding agent implementation introducing security vulnerabilities?
8+
9+
[Project CodeGuard](https://github.com/project-codeguard/rules) solves this by embedding security best practices directly into AI coding agent workflows.
10+
11+
👉 Access the [Project CodeGuard Rules here](https://github.com/project-codeguard/rules)
12+
13+
## Before, During, and After Code Generation
14+
15+
[Project CodeGuard](https://github.com/project-codeguard/rules) can be used **before**, **during** and **after** code generation. They can be used at the AI agent planning phase or for initial specification-driven engineering tasks. Project CodeGuard rules can also be used to prevent vulnerabilities from being introduced during code generation. They can also be used by automated code-review AI agents.
16+
17+
For example, a rule focused on input validation could work at multiple stages: it might suggest secure input handling patterns during code generation, flag potentially unsafe user or AI agent input processing in real-time and then validate that proper sanitization and validation logic is present in the final code. Another rule targeting secret management could prevent hardcoded credentials from being generated, alert developers when sensitive data patterns are detected, and verify that secrets are properly externalized using secure configuration management.
18+
19+
This multi-stage methodology ensures that security considerations are woven throughout the development process rather than being an afterthought, creating multiple layers of protection while maintaining the speed and productivity that make AI coding tools so valuable.
20+

0 commit comments

Comments
 (0)