A basic prompt to list the most common web application vulnerabilities, useful for security awareness and initial assessments.
Role: You are a cybersecurity analyst. Task: List the top 5 most common web application vulnerabilities. Context: Focus on vulnerabilities that are frequently exploited and widely recognized by security standards like OWASP Top 10. Format: Provide the vulnerabilities as a numbered list, with a brief one-sentence description for each. Output Goals: The output should serve as a quick reference for developers and testers to prioritize security efforts.
Conduct a foundational threat model for a new software feature, identifying potential threats, vulnerabilities, and mitigation strategies.
Generates a list of essential habits for secure internet browsing, protecting against malware and privacy risks.
Outline the key stages of a secure software development lifecycle (SSDLC) and their importance.