| name | ivangrynenko-cursorrules-drupal |
| description | Drupal development and security patterns from Ivan Grynenko's cursor rules. Covers OWASP Top 10, authentication, access control, injection prevention, cryptography, configuration, database standards, file permissions, and more. |
Ivan Grynenko - Drupal Cursor Rules
Source: Ivan Grynenko - Cursor Rules Author: Ivan Grynenko License: MIT
When This Skill Activates
Activates when working with Drupal security topics including:
- Authentication and session management
- Access control and permissions
- SQL injection and XSS prevention
- Cryptography and data protection
- Security configuration
- Dependency management
- SSRF prevention
- Secure design patterns
- Software integrity
- Security logging and monitoring
Available Topics
All topics are available as references in the /references/ directory.
Each reference contains:
- OWASP classification and reference
- Security patterns and anti-patterns
- Enforcement checks
- Code examples
- Best practices
OWASP Top 10 Coverage
- @references/authentication-security.md - Authentication failures (A07:2021)
- @references/access-control-security.md - Broken access control (A01:2021)
- @references/injection-prevention.md - Injection vulnerabilities (A03:2021)
- @references/data-security.md - Cryptographic failures (A02:2021)
- @references/security-configuration.md - Security misconfiguration (A05:2021)
- @references/dependency-security.md - Vulnerable components (A06:2021)
- @references/ssrf-prevention.md - Server-side request forgery (A10:2021)
- @references/secure-design.md - Insecure design (A04:2021)
- @references/integrity-validation.md - Software integrity failures (A08:2021)
- @references/logging-security.md - Logging and monitoring failures (A09:2021)
Additional Security Topics
- @references/database-standards.md - Database best practices
- @references/file-permissions.md - File security and access control
See /references/ directory for complete list.
To update: Run .claude/scripts/sync-ivan-rules.sh