Add Custom Code Rules
Custom Code Rules allow you to enforce team-specific coding standards and patterns unique to your organization. Create rules that detect specific code patterns, enforce naming conventions, or flag architectural violations that aren't covered by default checks.
What are Custom Code Rules?
Custom Code Rules are AI-powered checks that you define to match your team's specific requirements. Unlike default checks that apply general best practices, custom rules enforce standards unique to your codebase, architecture, or business logic.
Creating a Custom Code Rule
Define your rule
Navigate to Code Quality > Checks tab
Click Add Custom Code Rule
Write a clear description of what the rule should detect:
Example:
Allow only Alpine base images in Dockerfiles as base images
Generate and refine examples
Click Generate Examples to let AI create initial code samples
Review and modify the generated examples
Provide both compliant and non-compliant examples:
Compliant example:
# ✅ Code that follows the rule
FROM alpine:3.18
RUN apk add --no-cache nodejs
Non-compliant example:
# ❌ Code that violates the rule
FROM ubuntu:latest
RUN apt-get update && apt-get install nodejs
Configure rule details
Once validated, provide additional information about your rule:
Title: Give your rule a clear, descriptive name
Use Alpine base images in Docker containers
TL;DR: Write a brief summary of the issue
Non-Alpine base images increase container size and attack surface
How to fix: Provide actionable guidance for developers
Replace your base image with an Alpine Linux variant. For example, change 'FROM node:18' to 'FROM node:18-alpine'. You may need to adjust package installation commands from apt-get to apk.
Severity score: Set the importance level (1-100)
70-100: High severity - Blocks PRs or creates prominent warnings
40-69: Medium severity - Standard warnings in PR comments
1-39: Low severity - Informational comments only
Click Save Rule to activate it
Your custom rule will now appear in the Checks tab and begin scanning new pull requests in enabled repositories.
Writing effective Custom Rules
Be specific and clear
❌ Too vague:
Use proper error handling
✅ Specific and actionable:
All API endpoints must wrap database calls in try-catch blocks and return
standardized error responses with status codes
Focus on patterns, not style
Custom rules work best for detecting logical patterns rather than formatting:
✅ Good custom rule candidates:
API authentication requirements
Database transaction patterns
Security header implementations
Business logic validations
❌ Better handled by linters:
Indentation and spacing
Bracket placement
Variable naming style
Common Custom Rule examples
Security rules
All SQL queries must use parameterized statements. Direct string
concatenation in SQL queries is not allowed.
Architecture rules
Controllers should not directly access the database. All database
operations must go through a service or repository layer.
API standards
All REST API endpoints must include rate limiting headers
(X-RateLimit-Limit, X-RateLimit-Remaining, X-RateLimit-Reset).
Testing requirements
Every exported function must have at least one corresponding test
in the __tests__ directory with the same file name pattern.
Documentation standards
All public API methods must include JSDoc comments with @param,
@returns, and @throws annotations.
Last updated
Was this helpful?