- Project level (all plans): Configure guardrails for a specific project by selecting the specific project and then clicking Guardrails.
- Team level (Enterprise only): Configure guardrails across all projects from the Team Guardrails page. Team-level guardrails provide greater control and consistency across projects.
Default guardrails
By default, Corridor applies the Corridor Default Security Pack: a comprehensive pack of essential security guardrails covering common vulnerability classes including injection attacks, authentication issues, and access control flaws.Guardrail packs
Corridor provides a menu of pre-loaded security packs tailored to specific languages, app types, and standards. Teams can also create custom packs on the Team Guardrails page comprised of guardrails unique to their needs.Custom guardrails
Custom guardrails are available on Team and Enterprise plans.
- Auto-Generate Guardrail: Describe the vulnerability or vulnerability type, and Corridor will automatically create a guardrail for it.
- Create Manually: Write your own guardrail from scratch. It’s best practice to clearly articulate in plain language the security requirements for the guardrail, including any relevant internal libraries or standards to adhere by. Think of these as the security standards you would share with your engineering team.
- Import from Document: Upload a document, and Corridor will automatically generate guardrails based on its contents.
Adding custom context
Custom context is available on Team and Enterprise plans.
- Look for an Add Context option in the guardrails settings
- Paste text (like a policy excerpt) or upload a file
- Select whether the context applies to PR Reviews and/or MCP Plan (to guide agentic code generation)
Verify guardrails are working
After adjusting guardrails, it’s a good idea to test them:- Open a project in your IDE with the Corridor extension installed
- Try writing code that violates a guardrail (e.g., if you added “no eval allowed”, use
evalin a code generation prompt) - Corridor should catch and flag it
- You can also trigger a test pull request that violates a guardrail to ensure Corridor comments appropriately
Tuning guardrails
Guardrail configuration is key to reducing false positives and false negatives:- If Corridor is flagging too many things that aren’t issues, consider loosening or turning off certain guardrails (or improving context)
- If Corridor misses something important, consider adding a new guardrail or tightening an existing one