A basic prompt to list the most common web application vulnerabilities, useful for security awareness and initial assessments.
Role: You are a cybersecurity analyst. Task: List the top 5 most common web application vulnerabilities. Context: Focus on vulnerabilities that are frequently exploited and widely recognized by security standards like OWASP Top 10. Format: Provide the vulnerabilities as a numbered list, with a brief one-sentence description for each. Output Goals: The output should serve as a quick reference for developers and testers to prioritize security efforts.
Conduct a foundational threat model for a new software feature, identifying potential threats, vulnerabilities, and mitigation strategies.
Generates a list of essential habits for secure internet browsing, protecting against malware and privacy risks.
Create a tailored checklist for performing secure code reviews, focusing on common vulnerabilities and best practices for a specific programming language or framework.