CtrlK
BlogDocsLog inGet started
Tessl Logo

tessl-labs/pr-review-guardrails

Evidence-first pull request review with independent critique, selective challenger review, and human handoff.

87

1.31x
Quality

92%

Does it follow best practices?

Impact

87%

1.31x

Average score across 43 eval scenarios

SecuritybySnyk

Risky

Do not use without reviewing

Overview
Quality
Evals
Security
Files

criteria.jsonevals/scenario-39/

{
  "context": "Hard: auth tokens migrated from httpOnly cookies to localStorage — any XSS vulnerability now enables full account takeover via token exfiltration",
  "type": "weighted_checklist",
  "checklist": [
    {
      "name": "Catches token storage security downgrade",
      "description": "Identifies that moving tokens from httpOnly cookies (inaccessible to JavaScript) to localStorage (readable by any script on the page) is a security downgrade. Any XSS vulnerability now allows token exfiltration and full account takeover.",
      "max_score": 15
    },
    {
      "name": "Catches refresh token exposure",
      "description": "Identifies that storing the refresh token in localStorage is especially dangerous — refresh tokens are long-lived and allow persistent account access even after the access token expires",
      "max_score": 7
    },
    {
      "name": "Risk classified red",
      "description": "PR is classified as red due to auth/security token storage change that weakens the security posture",
      "max_score": 10
    }
  ]
}

README.md

tile.json