noted outdated features
This commit is contained in:
@@ -23,6 +23,7 @@ To maintain developer velocity (the "Friction" principle), pipeline feedback mus
|
||||
* **Tool:** `eslint` with `eslint-plugin-security` and `@typescript-eslint`.
|
||||
* **Reasoning:** Linters are "dumb" but instantaneous. They will catch AI agents generating immediately dangerous syntax (like `eval()` or unsafe Regex) before a commit is even made.
|
||||
|
||||
**outdated, using pulumi crossguard**
|
||||
### Layer 2: Infrastructure as Code (IaC) Scanning
|
||||
* **Tool:** Checkov (Open Source)
|
||||
* **Reasoning:** Lightweight CLI tool to ensure the AI agents do not accidentally expose internal homelab ports to the internet or misconfigure container permissions.
|
||||
@@ -47,6 +48,7 @@ To maintain developer velocity (the "Friction" principle), pipeline feedback mus
|
||||
| **Snyk Code** | Great UX, but lacks the ability to write custom rules. If the AI agent develops a specific bad habit unique to this codebase, Snyk cannot be easily tuned to block it. |
|
||||
| **Checkmarx / Veracode** | Built for massive legacy enterprise compliance. Far too expensive, slow, and noisy for a modern, agile homelab setup. |
|
||||
|
||||
**outdated using harvester default registry**
|
||||
## 5. Future Considerations / Phase 2
|
||||
* **Build Caching:** If actual container build steps (`docker build`, `npm install`) become the bottleneck in Argo Workflows, evaluate adding open-source caching layers like **Kaniko** or **BuildKit** inside Argo pods before purchasing paid caching solutions.
|
||||
* **Custom Semgrep Rules:** If the AI agent repeatedly makes domain-specific logic errors (e.g., misusing a specific custom Monad), write lightweight custom Semgrep YAML rules to permanently block those specific anti-patterns.
|
||||
|
||||
Reference in New Issue
Block a user