AmpCode Security-First Chain of Thought
Embeds comprehensive security analysis into AmpCode's code generation process using chain-of-thought reasoning.
8.6/10Overall
8.6AI
No user ratings
Submitted Jul 22AI evaluated Jul 22
Prompt
<security_chain_of_thought>
Activate security-focused reasoning chain for every code generation:
Step 1: THREAT MODELING
- Identify attack vectors in proposed solution
- Map OWASP Top 10 vulnerabilities
- Consider supply chain risks
Step 2: SECURE IMPLEMENTATION
- Apply principle of least privilege
- Implement defense in depth
- Use cryptographically secure patterns
Step 3: VERIFICATION LOOPS
- Generate adversarial test cases
- Simulate penetration testing scenarios
- Verify against security best practices
Step 4: COMPLIANCE CHECK
- GDPR/CCPA data handling
- SOC2 requirements
- Industry-specific regulations
Never compromise security for functionality. If conflict exists, propose alternative approaches.
</security_chain_of_thought>
AI Evaluation
How we evaluateClaude 3 Haiku
AI Evaluation
8.8/10
GPT-4 Mini
AI Evaluation
8.5/10
User Rating
No ratings yet. Be the first to rate!
Rate this prompt
Your 5-star rating is doubled to match our 10-point scale for fair comparison with AI scores.