
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
cursor-rules-essentials
Advanced tools
Essential Cursor Rules for Code Quality, Accessibility, and Best Practices
Essential Cursor Rules for Code Quality, Accessibility, and Best Practices
npx cursor-rules-essentials
One command installs 15 essential .mdc rules for Cursor IDE.
Cursor Rules (.mdc files) are automatically enforced guidelines that help maintain code quality, accessibility, and best practices as you code. They work silently in the background, catching issues before they become problems.
| Bundle | Rules | Use Case |
|---|---|---|
| Minimal | 3 | Core quality only |
| Standard | 7 | + React patterns |
| Complete | 15 | All essential rules |
| Rule | Description |
|---|---|
web-standards | Real-time code quality enforcement (component limits, hooks, styling) |
pr-quality | PR validation - max files, lines, single responsibility |
plan-first | Require implementation plan for complex multi-file changes |
yolo-mode-config | Auto-run validation without manual intervention |
| Rule | Description |
|---|---|
react-functional-patterns | Functional component syntax, hooks organization, error handling |
form-patterns | useWatch over watch(), memoize Yup schemas, OXForm wrapper |
async-effect-patterns | AbortController for async useEffect, cleanup patterns |
client-boundary | SSR/CSR boundary detection, prevent hydration mismatches |
| Rule | Description |
|---|---|
a11y-standards | ARIA labels, keyboard navigation, focus management |
| Rule | Description |
|---|---|
auto-adr | Auto-generate Architecture Decision Records when patterns change |
refactoring-gravity | Identify high-churn files with high coupling |
z-index-governance | Enforce z-index token system to prevent z-index wars |
| Rule | Description |
|---|---|
auto-self-heal | Auto-detect and fix common antipatterns while coding |
bundle-budget-guard | Monitor bundle size impact when adding dependencies |
visual-regression-guard | Auto-detect UI changes and require visual verification |
Rules are automatically applied by Cursor based on their configuration:
# Example rule header
---
description: Real-time code quality enforcement
globs: ["**/*.tsx", "**/*.ts"]
alwaysApply: true
severity: warn
---
block, warn, or infonpx cursor-rules-essentials # Interactive install
npx cursor-rules-essentials --bundle complete -y # Non-interactive
npx cursor-rules-essentials status # Check installed rules
npx cursor-rules-essentials list # List all available rules
npx cursor-rules-essentials help # Show help
After installation:
.cursor/
└── rules/
├── a11y-standards.mdc
├── async-effect-patterns.mdc
├── auto-adr.mdc
├── auto-self-heal.mdc
├── bundle-budget-guard.mdc
├── client-boundary.mdc
├── form-patterns.mdc
├── plan-first.mdc
├── pr-quality.mdc
├── react-functional-patterns.mdc
├── refactoring-gravity.mdc
├── visual-regression-guard.mdc
├── web-standards.mdc
├── yolo-mode-config.mdc
└── z-index-governance.mdc
web-standards - Component size limits, hook patternspr-quality - PR scope limits, single responsibilitya11y-standards - Accessibility requirementsrefactoring-gravity - High-churn filesbundle-budget-guard - Bundle size growthvisual-regression-guard - UI changesauto-self-heal - Fix antipatterns automaticallyyolo-mode-config - Run validation without promptsMIT © Sharath Chandra
Write better code, automatically.
FAQs
Essential Cursor Rules for Code Quality, Accessibility, and Best Practices
The npm package cursor-rules-essentials receives a total of 3 weekly downloads. As such, cursor-rules-essentials popularity was classified as not popular.
We found that cursor-rules-essentials demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.