Documentation
Complete guide to Vibe-Guard's security scanning capabilities and features.
Motivation
Vibe-Guard was created to solve the problem of security scanning that actually catches real vulnerabilities without the noise. Traditional security tools often produce overwhelming false positives, making them impractical for daily development workflows.
Security Rules
Vibe-Guard implements 25 carefully crafted security rules that target real-world vulnerabilities commonly found in production applications.
Rule Categories
- Injection Attacks: SQL Injection, XSS, Command Injection
- Authentication & Authorization: Broken Access Control, Missing Authentication
- Data Exposure: Exposed Secrets, Hardcoded Credentials
- Configuration: Insecure Dependencies, Insecure Configuration
- Input Validation: Unvalidated Input, Directory Traversal
- AI Security: AI-generated code validation, Prompt injection detection
Scanning Engine
Vibe-Guard uses optimized regex patterns to efficiently detect vulnerabilities across multiple file types.
Performance & Benchmarks
Vibe-Guard is engineered for maximum speed and efficiency, designed to scan large codebases in seconds, not minutes.
Startup Time
Near-instant startup with zero dependency resolution delays
Small Files (1KB)
Ultra-fast scanning for individual files
Medium Files (5KB)
Very fast processing for typical source files
Large Files (50KB)
Efficient handling of large code files
Memory Usage
Ultra-low memory footprint for large projects
Directory Scan
Fast scanning of entire project directories
Performance Features
- Zero Dependencies: No external runtime dependencies
- Optimized Patterns: Pre-compiled regex patterns for maximum speed
- Smart Filtering: Skip irrelevant files and directories
- Memory Efficient: Stream-based processing for large files
- Fast Startup: No dependency resolution delays
- Parallel Processing: Efficient multi-threading for large codebases
Run Your Own Benchmarks
Test Vibe-Guard's performance on your own system:
Performance Comparison
Tool | Startup Time | Small File | Large File | Memory Usage | Dependencies |
---|---|---|---|---|---|
Vibe-Guard | ~41ms | ~51ms | ~117ms | ~56KB | 0 |
Other Security Tools | 2-5s | 500ms-2s | 5-15s | 50-200MB | 50-200 |
Real-World Performance
Vibe-Guard has been tested on various project sizes:
- Small Projects (1-10 files): Scans complete in under 200ms
- Medium Projects (100-1000 files): Scans complete in 2-5 seconds
- Large Projects (1000+ files): Scans complete in 8-20 seconds
- Enterprise Codebases: Efficiently handles projects with 10,000+ files
Zero Dependencies
Vibe-Guard is built with zero runtime dependencies, making it lightweight, fast, and secure.
Benefits
- Lightweight: Under 1MB total size
- Fast Startup: No dependency resolution delays
- Security: No external dependencies to audit
- Reliability: No dependency conflicts or version issues
- Portability: Works anywhere Node.js runs
Installation
Vibe-Guard can be installed via multiple methods depending on your platform and preferences.
Basic Usage
Get started with Vibe-Guard in under 30 seconds.
CLI Options
Vibe-Guard provides essential command-line options for customization.
Option | Description | Default |
---|---|---|
--format |
Output format (table, json, sarif, html) | table |
--output-file |
Save results to file | stdout |
--verbose |
Show detailed output | false |
--exclude |
Exclude file patterns | config |
--include |
Include file patterns | config |
CLI Commands
Command | Description |
---|---|
vibe-guard scan <target> |
Scan files or directories |
vibe-guard rules |
List all available security rules |
vibe-guard init |
Create a default vibe-guard.json configuration file |
vibe-guard config |
Show sample configuration |
vibe-guard version |
Show version information |
File Scanning
Vibe-Guard automatically discovers and scans files across your project.
Supported File Types
- JavaScript/TypeScript: .js, .jsx, .ts, .tsx
- Web Frameworks: .vue, .svelte
- Backend Languages: .py, .php, .rb, .go, .java, .cs
- Systems Languages: .cpp, .c, .h, .rs, .kt
- Configuration: .json, .yaml, .yml, .xml, .env
Configuration Support
Vibe-Guard automatically loads configuration from vibe-guard.json
files in your project hierarchy.
Automatic Filtering
- Skips binary files and large files (>5MB)
- Excludes common directories (node_modules, dist, .git)
- Ignores minified and bundled files
Rule System
Vibe-Guard uses a pattern-based rule system to detect security vulnerabilities.
Severity Levels
- Critical: Immediate security risk
- High: Significant security vulnerability
- Medium: Moderate security concern
- Low: Minor security issue
Output Formats
Vibe-Guard provides two output formats for different use cases.
Text Format (Default)
Human-readable console output with color-coded severity levels and detailed issue descriptions.
JSON Format
Machine-readable structured data for integration with other tools and CI/CD pipelines.
SARIF Format
Static Analysis Results Interchange Format for integration with GitHub, Azure DevOps, and other tools.
HTML Format
Beautiful, interactive HTML reports for sharing with teams and stakeholders.
TypeScript Types
Vibe-Guard provides comprehensive TypeScript types for type-safe development.
False Positives
Learn how to handle and reduce false positives in your security scans.
Common False Positive Sources
- Test Files: Mock data and test scenarios
- Documentation: Code examples in comments
- Generated Code: Auto-generated boilerplate
- Legacy Code: Deprecated but safe patterns
Best Practices
Follow these best practices to get the most out of Vibe-Guard.
Scanning Strategy
- Run scans early in development, not just before deployment
- Review findings in context - not all matches are vulnerabilities
- Use Vibe-Guard alongside other security tools
- Regularly update to get the latest security patterns
Integration Tips
- Add Vibe-Guard to your development workflow
- Use JSON output for CI/CD integration
- Set up regular automated scans
- Document security findings and fixes
Roadmap
Future features we're planning to add to Vibe-Guard.
Planned Features
- Custom Rules: User-defined security rules
- CI/CD Integration: GitHub Actions and other CI/CD examples
- Performance Improvements: Parallel processing, caching
- IDE Integration: VS Code extension, editor plugins