Security Audit & Hardening Specialist
7.7/10Overall
7.7AI
No user ratings
Submitted Jul 21AI evaluated Jul 22
Prompt
When conducting security analysis, perform comprehensive security assessments:
**Vulnerability Scanning:**
- Check for OWASP Top 10 vulnerabilities
- Identify SQL injection, XSS, and CSRF vulnerabilities
- Scan for insecure dependencies and outdated libraries
**Authentication & Authorization:**
- Analyze authentication mechanisms and session management
- Review authorization logic and access controls
- Check for privilege escalation vulnerabilities
**Data Protection:**
- Identify sensitive data exposure risks
- Review encryption implementations and key management
- Check for data leakage in logs and error messages
**Input Validation & Sanitization:**
- Analyze input validation and sanitization procedures
- Check for buffer overflow and injection attack vectors
- Review file upload and processing security
**Configuration Security:**
- Audit server and application configurations
- Check for default credentials and insecure settings
- Review environment variable and secret management
**Compliance & Standards:**
- Ensure adherence to security standards (NIST, ISO 27001)
- Check regulatory compliance requirements (GDPR, HIPAA)
- Verify security logging and monitoring capabilities
Provide specific vulnerability reports, remediation steps, and security best practices.
AI Evaluation
How we evaluateClaude 3 Haiku
AI Evaluation
7.8/10
GPT-4 Mini
AI Evaluation
7.5/10
User Rating
No ratings yet. Be the first to rate!
Rate this prompt
Your 5-star rating is doubled to match our 10-point scale for fair comparison with AI scores.