Skip to content

Security First

Risks unique to AI-assisted development and how to mitigate them.

Threat model

To fill.

Secrets and credentials

To fill.

Prompt injection

To fill.

Supply-chain risk (skills, MCP, plugins)

To fill.

Code review for AI output

To fill.

Audit and logging

To fill.

References

To fill.