Quick update on the security agents repo I shared last week- just published an 11-minute walkthrough showing exactly how to use them.
(For anyone who's been staring at the GitHub repo wondering "okay but how do I actually run these?")
The agents check for:
• Authentication & authorization gaps
• SQL injection & XSS vulnerabilities
• Exposed secrets in client code
• Missing rate limiting (caught this in the demo)
• Database security (RLS coverage)
• Dependency vulnerabilities
• And about 14 other attack vectors
What made me build these agents?
We had 3 engineers review a feature last month. Everyone approved.
The security agents caught a critical authorization flaw in 6 minutes.
It's not about skill.
Developers review features for:
→ Does it work?
→ Is the code clean?
→ Do tests pass?
Not for:
→ Can someone bypass this?
→ What if they modify the request?
→ Is authorization actually enforced?
That's the difference between coding and security thinking.
No matter how comprehensive the security checklist is, the tiniest of things might slip.
Now we run these agents before we ship anything.
Try these on your codebase. Would love to hear your feedback in comments!