#vulnerabilities Cursor Rules
Cursor IDE rules tagged with #vulnerabilities.
Securing Node.js Applications Against Common Vulnerabilities
Best practices for protecting Node.js applications from common security threats such as XSS, SQL Injection, and CSRF.
Building Secure Python Applications
Best practices for writing secure Python code to protect against common vulnerabilities and ensure data integrity.