The AI Wrote It, You Shipped It

Security for directors: a short safety layer for people who can steer AI but do not want to learn appsec before they build something useful.

You do not need OWASP to use AI well. You do need a few habits.

If you are on the director track, the risk is simple: you can now ship software you did not personally write. That is power. It is also how secrets leak, ports stay open, prompt injection slips through, and demo code becomes public code without anyone noticing the boundary moved.

The point is not to become paranoid. The point is to stop shipping things you have not even asked basic questions about.

Who this is for

The four rules

What to ask the agent before you ship

You do not need to know the answer to these questions yourself. You do need to ask them.

Before we deploy this, audit it like a cautious reviewer.

Tell me:
1. What secrets, tokens, keys, or credentials this project uses
2. What ports, routes, or admin surfaces it exposes
3. What files or directories it can read and write
4. What external URLs, domains, or APIs it calls
5. Whether any user input can reach HTML, shell commands, file paths, or prompts
6. What the weakest part of the current design is

If anything is risky, tell me what to fix before deployment.

Fast red flags

The practical split

This page is the habit layer. Use Before You Deploy for the final checklist, and Prompt Injection for the specific trust problem that appears when pages, documents, and pasted text can steer an agent.

What good looks like

A good first deployment is small, boring, and reversible. The app knows its boundary. The secrets are not in the repo. The routes are intentional. The agent has less power than you think it wants. The logs tell you what happened. And if something feels off, you can turn it off quickly.

That is enough. Security for directors is not mastery. It is refusing to ship blind.

Related pages