Skip to content

Commit efb1ebf

Browse files
committed
add extra explanation for the security flavorz
1 parent 9d08650 commit efb1ebf

File tree

4 files changed

+54
-4
lines changed

4 files changed

+54
-4
lines changed

cursor/rules/conversation-log.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,3 +42,6 @@ Assistant: Added @SuppressFBWarnings annotation to getActualSecret with justific
4242

4343
User: can you update the conversation history file?
4444
Assistant: (this file)
45+
46+
User: can you update the materials in @/rules please?
47+
Assistant: Updated project-specification.mdc to include security best practices and real-world requirements from challenge56_reason.adoc for future reference.

cursor/rules/project-specification.mdc

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170,3 +170,26 @@ To speed up challenge creation, follow these steps:
170170
---
171171

172172
**Tip:** Use the most recent challenge as a template for new ones to save time and ensure consistency.
173+
174+
---
175+
176+
## Security Requirements and Best Practices (for Real Projects)
177+
178+
In real projects, always include explicit security requirements in your project specification or agentic plan. This should cover:
179+
- How secrets are managed, stored, and rotated
180+
- Who has access to sensitive files and how access is controlled
181+
- Tools/processes for scanning all files (including documentation) for secrets
182+
- Regular reviews of code and documentation for accidental secret leakage
183+
184+
[NOTE]
185+
====
186+
Always include security instructions on:
187+
- TLS/SSL usage for all network communications
188+
- Encryption of sensitive data at rest and in transit
189+
- Input validation and sanitization to prevent injection attacks
190+
- Secure authentication and authorization mechanisms
191+
- Regular dependency and vulnerability scanning
192+
- Logging and monitoring for suspicious activity
193+
194+
These practices are essential for protecting your application and its data.
195+
====

src/main/resources/explanations/challenge56.adoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,5 @@ The secret is present as an example instruction in the specification file. Your
66

77
This challenge demonstrates how secrets can sometimes be hidden in documentation or specification files, which are often overlooked during security reviews.
88

9-
[NOTE]
10-
====
9+
=== NOTE
1110
This challenge was generated entirely by AI and is therefore very different from the other challenges in this project.
12-
====
Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,29 @@
11
*Why you should check documentation for secrets*
22

3-
Documentation and specification files are often shared widely and may be overlooked during security reviews. Sometimes, secrets or sensitive information are added as examples or instructions and are not removed before sharing or publishing. This challenge highlights the importance of reviewing all project files—including documentation—for secrets and sensitive data.
3+
Documentation and specification files are often shared widely and may be overlooked during security reviews.
4+
Sometimes, secrets or sensitive information are added as examples or instructions and are not removed before sharing or publishing.
5+
This challenge highlights the importance of reviewing all project files—including documentation—for secrets and sensitive data.
6+
7+
----
8+
9+
In a real project, you should always include explicit security requirements in your project specification or agentic plan. This means:
10+
- Listing how secrets should be managed, stored, and rotated.
11+
- Defining who has access to sensitive files and how access is controlled.
12+
- Stating which tools or processes must be used to scan for secrets in all files, including documentation.
13+
- Requiring regular reviews of both code and documentation for accidental secret leakage.
14+
15+
Adding these requirements helps ensure that security is considered from the start and reduces the risk of sensitive data exposure through overlooked files or bad practices.
16+
17+
[NOTE]
18+
====
19+
In real projects, always include security instructions on:
20+
- TLS/SSL usage for all network communications
21+
- Encryption of sensitive data at rest and in transit
22+
- Input validation and sanitization to prevent injection attacks
23+
- Secure authentication and authorization mechanisms
24+
- Regular dependency and vulnerability scanning
25+
- Logging and monitoring for suspicious activity
26+
- Using the right model and language for the right problem
27+
28+
These practices are essential for protecting your application and its data.
29+
====

0 commit comments

Comments
 (0)