Toranj.ai

Custom Security Rules

Create custom vulnerability detection rules tailored to your organization's specific security requirements, coding standards, and compliance needs.

30 minutes to learn
Advanced users

Types of Custom Rules

Choose the type of custom rule that best fits your security requirements

Security Rules

Medium

Custom vulnerability detection patterns

SQL injection patterns
XSS detection
Authentication bypass
Encryption validation

Code Quality Rules

Easy

Code maintainability and best practices

Complexity limits
Naming conventions
Documentation requirements
Performance patterns

Compliance Rules

Hard

Industry-specific regulatory requirements

HIPAA data handling
PCI DSS requirements
GDPR compliance
SOX controls

Business Logic Rules

Medium

Organization-specific requirements

API rate limiting
Data validation
Access control
Audit logging

Creating Custom Rules

Step-by-step guide to creating effective security rules

Supported Rule Formats

YAML Rules

.yml
Most Popular

Human-readable rule definitions

JSON Rules

.json
Common

Structured rule format

RegEx Patterns

.regex
Advanced

Pattern-based detection

AST Queries

.ast
Expert

Abstract syntax tree analysis

Best Practices

Do's

  • Start with existing rule templates
  • Include comprehensive metadata
  • Test thoroughly before deployment
  • Version control your custom rules
  • Document rule purpose and usage

Don'ts

  • Create overly broad patterns
  • Skip testing on real codebases
  • Ignore performance implications
  • Deploy without team review
  • Forget to update rule documentation

Rule Templates & Examples

Ready-to-use templates for common security scenarios

Security Templates

Common vulnerability patterns

Quality Templates

Code quality and standards

Compliance Templates

Industry compliance rules

Advanced Features

Rule Chaining

Combine multiple rules for complex vulnerability detection

depends_on: [rule-1, rule-2]

Conditional Logic

Apply rules based on file types, project structure, or context

when: file.ext == "js"

Custom Severity

Define organization-specific severity levels

severity: company-critical

Auto-Remediation

Suggest or apply automatic fixes for detected issues

fix: "replace with safe method"