Babysitter security-hardening

AIDefence security layer with prompt injection blocking, input validation, sandboxed execution, output sanitization, and STRIDE threat modeling.

install
source · Clone the upstream repo
git clone https://github.com/a5c-ai/babysitter
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/a5c-ai/babysitter "$T" && mkdir -p ~/.claude/skills && cp -r "$T/library/methodologies/ruflo/skills/security-hardening" ~/.claude/skills/a5c-ai-babysitter-security-hardening && rm -rf "$T"
manifest: library/methodologies/ruflo/skills/security-hardening/SKILL.md
source content

Security Hardening

Overview

Multi-layered security audit pipeline implementing the AIDefence architecture. Protects against prompt injection, path traversal, and other attack vectors while ensuring compliance with security best practices.

When to Use

  • Before deploying code to production
  • When processing untrusted inputs
  • Security audits of agent-generated code
  • Compliance verification (OWASP Top 10, CIS)

AIDefence Layers

  1. Prompt Injection Detection - Pattern + heuristic blocking
  2. Input Validation - Path traversal, type coercion, parameter sanitization
  3. Static Analysis (SAST) - Vulnerability scanning, CWE matching
  4. Sandboxed Execution - Network isolation, filesystem restrictions, resource limits
  5. Output Sanitization - Secrets, PII, injection vector redaction

Security Levels

LevelLayersUse Case
standardSAST + validation + sanitizationRoutine audits
elevated+ threat modeling + compliancePre-release audits
maximum+ sandbox + full STRIDE + remediationCritical systems

Agents Used

  • agents/security-auditor/
    - Vulnerability detection
  • agents/reviewer/
    - Code quality verification

Tool Use

Invoke via babysitter process:

methodologies/ruflo/ruflo-security-audit