Hawk, the security agent

Hawk runs Decalyst built-in 20-point security scanner on every diff. It flags path traversal, SQL injection, credential leaks, timing attacks, and OWASP pitfalls. Hawk escalates through Nano, o3, Sonnet, and Opus as severity and scope grow, with manual gates at the highest cost tiers.

Model tiers

TierTriggerModel
T1 Quick pattern checksurface-level patternsGPT-5 Nano
T2 Full file OWASP scanmulti-file or ambiguous threato3
T3 Auth, payments, cryptosensitive domainsClaude Sonnet 4.6
T4 Compliance auditregulatory or architectural reviewClaude Opus 4.7

Escalation

Manual gate for GPT-5.4 Pro on the hardest issues, never automatic due to cost.

Sample

Security finding

services/upload.ts:88, path traversal via ../, severity high
fix: validate against allowlist of project rootPath

See also

  • Lens
  • Forge
  • Security review feature