Curious if others have run into this:
A few of our developers used Cursor to build out a feature, good implementation, but Cursor completely overlooked basic security best practices. It ended up causing a (thankfully minor) incident, which came out during the RCA.
Has anyone else experienced this? Any solutions for integrating security guardrails into cursor? Ideally, specific for what teams are working on.
Thanks!