Scan LLM-generated code for security vulnerabilities using language-aware pattern rules
A guardrail automatically scans code in your responses for security vulnerabilities. You also have a tool for on-demand code scanning.
When HITL (human-in-the-loop) is enabled with guardrailOverride: true (the default), the code-safety scanner runs after HITL approval as a post-approval guardrail. This means even actions approved by a human operator or LLM judge are scanned for destructive patterns before execution. This catches accidental approvals of dangerous commands like rm -rf / or DROP TABLE. See the hitl-safety skill for full HITL configuration.