Rules Overview
Risk codes are grouped by category:
NETWORK:*- exfiltration, remote execution, credential leaks, localhost exposureINJECTION:*- command injection patternsPROMPT:*- prompt override and prompt-injection patternsDESTRUCTIVE:*- destructive behavior and permission weakeningPRIVILEGE:*- privilege escalation indicatorsPERSISTENCE:*- persistence mechanismsSECRETS:*- secret access and handling concerns
Rule definitions are language-aware and cover Bash, JavaScript, TypeScript, Python, Markdown, and text contexts.