#vulnerabilities Cursor Rules

Cursor IDE rules tagged with #vulnerabilities.

Securing Node.js Applications Against Common Vulnerabilities

Best practices for protecting Node.js applications from common security threats such as XSS, SQL Injection, and CSRF.

Building Secure Python Applications

Best practices for writing secure Python code to protect against common vulnerabilities and ensure data integrity.