The trust gap
Before an AI tool runs, a repository can influence behavior through:- MCP server definitions and remote endpoints
- Hooks, workflows, and command templates
- Rule and skill markdown files that can carry hidden or coercive instructions
- Workspace settings and extension manifests
- Files that change over time after a user has already “trusted” a project
What CodeGate tries to do
CodeGate provides a pre-flight workflow that helps you:- Discover execution and configuration surfaces across your project
- Detect common high-risk patterns before any agent runs
- Understand risk with enough context to make an informed decision
- Apply reversible remediation where possible
- Recheck for trust drift just before tool launch with
codegate run
What CodeGate does not claim
CodeGate is not a guarantee of safety.- It can produce false positives and false negatives.
- It does not replace secure engineering review.
- Optional deep analysis requires controlled interaction with remote metadata and local tools.
- New attack techniques can appear before signatures and heuristics are updated.
Guiding principles
These principles shape how CodeGate is built and how it behaves:| Principle | What it means in practice |
|---|---|
| Inspect before trust | Run a scan before launching any AI coding agent. |
| Prefer explicit consent | High-risk operations require user confirmation — they are not silent. |
| Keep operations explainable | Findings include rule IDs, severity, and remediation guidance so you can evaluate them, not just accept them. |
| Treat documented risk as real risk | If a behavior is dangerous, it matters even if it appears in a changelog or policy doc that most users will not read. |
| Preserve operator control | Backups, undo, suppression rules, and policy thresholds keep you in control of what gets fixed and when. |
Where to go next
Quickstart
Install CodeGate and run your first scan in under two minutes.
Analysis layers
How the L1–L4 pipeline works and what each layer detects.
Finding categories
Reference for all finding types including CONSENT_BYPASS and COMMAND_EXEC.
Safety model
CodeGate’s own threat model and operational limits.