security practices .cursorrules strategies