takt/builtins/en/facets/instructions/review-security.md

582 B

Review the changes from a security perspective. Check for the following vulnerabilities:

  • Injection attacks (SQL, command, XSS)
  • Authentication and authorization flaws
  • Data exposure risks
  • Cryptographic weaknesses

Judgment Procedure

  1. Review the change diff and detect issues based on the security criteria above
    • Cross-check changes against REJECT criteria tables defined in knowledge
  2. For each detected issue, classify as blocking/non-blocking based on Policy's scope determination table and judgment rules
  3. If there is even one blocking issue, judge as REJECT