Why a security-focused pipeline
Generic code review catches style and bugs. But security vulnerabilities — SQL injection, hardcoded secrets, insecure auth patterns — need dedicated rules that treat findings as critical blockers. This cookbook sets up a security-first layer on top of your existing review.Step 1 — Enable security analysis
Make sure security analysis is enabled:Step 2 — Create OWASP-focused rules
SQL injection prevention
Hardcoded secrets detection
Authentication bypass
XSS prevention
Step 3 — Teach security Memories
Create persistent conventions that apply everywhere:Step 4 — Configure for zero tolerance
For security rules, you want critical findings to block:- Enable Request Changes in PR Workflow settings so Kody requests changes when critical issues are found
- Set security rules to Critical severity so they always surface above any severity filter
- Do NOT set a low
maxSuggestionslimit — security findings should never be suppressed
Step 5 — Add a dependency audit rule (optional)
If you use MCP plugins, you can check dependencies:Checklist
- Security analysis enabled in reviewOptions
- SQL injection rule covers all DB-interacting code
- Secrets detection rule covers all file types
- Auth bypass rule references your actual auth patterns
- XSS rule covers all frontend component files
- Security Memories teach general secure coding principles
- Request Changes enabled for critical findings
- A test PR confirmed rules fire correctly