Back to list
ed3dai

defense-in-depth

by ed3dai

Ed's repo of Claude Code plugins, centered around a research-plan-implement workflow. Only a tiny bit cursed. If you're lucky.

72🍴 3📅 Jan 23, 2026

SKILL.md


name: defense-in-depth description: Use when invalid data causes failures deep in execution - validates at every layer data passes through to make bugs structurally impossible rather than temporarily fixed

Defense-in-Depth Validation

Overview

When you fix a bug caused by invalid data, adding validation at one place feels sufficient. But that single check can be bypassed by different code paths, refactoring, or mocks.

Core principle: Validate at EVERY layer data passes through. Make the bug structurally impossible.

When to Use

Use when:

  • Invalid data caused a bug deep in the call stack
  • Data crosses system boundaries (API → service → storage)
  • Multiple code paths can reach the same vulnerable code
  • Tests mock intermediate layers (bypassing validation)

Don't use when:

  • Pure internal function with single caller (validate at caller)
  • Data already validated by framework/library you trust
  • Adding validation would duplicate identical checks at adjacent layers

The Four Layers

Layer 1: Entry Point Validation

Purpose: Reject invalid input at API/system boundary

function createProject(name: string, workingDirectory: string) {
  if (!workingDirectory?.trim()) {
    throw new Error('workingDirectory cannot be empty');
  }
  if (!existsSync(workingDirectory)) {
    throw new Error(`workingDirectory does not exist: ${workingDirectory}`);
  }
  // ... proceed
}

When needed: Always. This is your first line of defense.

Layer 2: Business Logic Validation

Purpose: Ensure data makes sense for this specific operation

function initializeWorkspace(projectDir: string, sessionId: string) {
  if (!projectDir) {
    throw new Error('projectDir required for workspace initialization');
  }
  // ... proceed
}

When needed: When business rules differ from entry validation, or when mocks might bypass Layer 1.

Layer 3: Environment Guards

Purpose: Prevent dangerous operations in specific contexts

async function gitInit(directory: string) {
  if (process.env.NODE_ENV === 'test') {
    const normalized = normalize(resolve(directory));
    if (!normalized.startsWith(tmpdir())) {
      throw new Error(`Refusing git init outside temp dir in tests: ${directory}`);
    }
  }
  // ... proceed
}

When needed: When operation is destructive/irreversible, especially in test environments.

Layer 4: Debug Instrumentation

Purpose: Capture context for forensics when other layers fail

async function gitInit(directory: string) {
  logger.debug('git init', { directory, cwd: process.cwd(), stack: new Error().stack });
  // ... proceed
}

When needed: When debugging is difficult, or when you need to trace how bad data arrived.

Decision Heuristic

SituationLayers Needed
Public API, simple validation1 only
Data crosses multiple services1 + 2
Destructive operations (delete, init, write)1 + 2 + 3
Chasing a hard-to-reproduce bug1 + 2 + 3 + 4
Tests mock intermediate layersAt minimum: 1 + 3

Applying the Pattern

When you find a bug caused by invalid data:

  1. Trace the data flow - Where does the bad value originate? Where is it used?
  2. Map checkpoints - List every function/layer the data passes through
  3. Decide which layers - Use heuristic above
  4. Add validation - Entry → business → environment → debug
  5. Test each layer - Verify Layer 2 catches what bypasses Layer 1

Quick Reference

LayerQuestion It AnswersTypical Check
EntryIs input valid?Non-empty, exists, correct type
BusinessDoes it make sense here?Required for this operation, within bounds
EnvironmentIs this safe in this context?Not in prod, inside temp dir, etc.
DebugHow did we get here?Log stack, cwd, inputs

Common Mistakes

MistakeFix
One validation point, call it doneAdd at least entry + business layers
Identical checks at adjacent layersMake each layer check something different
Environment guards only in prodAdd them in test too (prevent test pollution)
Skipping debug loggingAdd it during the bug hunt, keep it
Validation but no useful error messageInclude the bad value and expected format

Key Insight

During testing, each layer catches bugs the others miss:

  • Different code paths bypass entry validation
  • Mocks bypass business logic checks
  • Edge cases need environment guards
  • Debug logging identifies structural misuse

Don't stop at one validation point. The bug isn't fixed until it's impossible.

Score

Total Score

65/100

Based on repository quality metrics

SKILL.md

SKILL.mdファイルが含まれている

+20
LICENSE

ライセンスが設定されている

0/10
説明文

100文字以上の説明がある

+10
人気

GitHub Stars 100以上

0/15
最近の活動

1ヶ月以内に更新

+10
フォーク

10回以上フォークされている

0/5
Issue管理

オープンIssueが50未満

+5
言語

プログラミング言語が設定されている

+5
タグ

1つ以上のタグが設定されている

+5

Reviews

💬

Reviews coming soon